Page 42 - profile2014.indd
P. 42

Computation theory and algorithms is the
                                                         foundation of Computer Science with studies of
                                                         power and limits of computing problems.

                                                   Computation Theory


                                                   and Algorithms Lab

                 Lab




                Research Faculty
                Bo-Yin Yang                        Computational Learning Theory: Many situations in daily life require us to make re-
                Research Fellow                    peated decisions before knowing the resulting outcomes. This motivates the study
                                                   of the so-called online decision problem, in which one must iteratively choose an
                Kai-Min Chung
                Assistant Research Fellow          action and then receive some corresponding loss for a number of rounds. For this
                                                   problem, we identify natural scenarios in which  online algorithms with improved
                Tsan-sheng Hsu                     performances can be designed. Moreover, we are discovering new applications of
                Research Fellow
                                                   this problem in different areas, such as machine learning, game theory, and com-
                Ming-Tat Ko                        plexity theory.
                Research Fellow
                Der-Tsai Lee                       (1) Cryptography
                Distinguished Research Fellow
                Churn-Jung Liau                   • Efficient Cryptography and CHES (Crypto Hardware and Embedded Systems): We
                Research Fellow                    are working on designing cryptographical approaches for specialized hardware, in-
                Jing-Sin Liu                       cluding implementing cryptographical algorithms in vector units in CPUs, FPGAs,
                Associate Research Fellow          ASICs, and GPU (graphic processing units). One of our record-breaking results is the
                Chi-Jen Lu                         use of GPUs to assist in cryptanalytic computations. We also study the implementa-
                Research Fellow                    tion of practical information security algorithms, such as using intelligent agents to
                                                   assist server-less authenticated information exchanges.
                Da-Wei Wang
                Research Fellow
                                                  • Post-Quantum Cryptography: Our work on MPKCs (Multivariate Public-Key Cryp-
                                                   tosystems) has advanced our understanding of the field from both theoretical and
                                                   practical viewpoints. MPKCs operate on a vector of variables over a small field, in-
                                                   stead of on an element in a huge algebraic structure (as in RSA or ECC). This key
                                                   characteristic makes MPKCs faster while maintaining comparable design security;
                                                   hence, they are useful for low-resource environments, such as embedded systems
                                                   and smart cards.

                                                  • Algebraic Cryptanalysis: We work on faster implementations and additional theory
                                                   behind such system-solvers. This work also relates to that on MPKCs, since an attack
                                                   on an MPKC is equivalent to solving a multivariate quadratic system (MQ) or the
                                                   extended isomorphism of polynomials (EIP).

                                                  • Theoretical Cryptography: Theoretical cryptography aims to understand the fea-
                                                   sibility and limitations of various
                                                   ambitious cryptographic tasks. Re-
                                                   cently, there  has been very  rapid
                                                   progress in cryptography, realizing
                                                   strong primitives that were not
                                                   even imaginable before.  We have
                                                   participated in this development,
                                                   proposing new notions of program
                                                   obfuscations and new construc-
                                                   tions  of functional  encryptions.
                                                   Additionally, we  are identifying
                                                   and obtaining new desiderata for
                                                   large-scale multi-party computa-
                                                   tion, motivated by the explosion in






          42    研究群 Research Laboratories
   37   38   39   40   41   42   43   44   45   46   47