应银河官网国家安全学交叉学科信息安全方向的邀请,沙特阿拉伯苏丹王子大学的Ahmed A. Abd El-Latif教授于2022年6月18日为银河官网师生讲学。欢迎全校相关教师、博士生、硕士生参加!
报告题目:Advances in cryptography and quantum computing for cybersecurity applications
报 告 人: Ahmed A. Abd El-Latif教授
报告人单位:苏丹王子大学
时 间:2022年6月18日(周六),14:30—16:00
报告地点:腾讯会议号:595-833-562
主办单位:重点建设与发展工作处、4556银河国际在线
Ahmed A. Abd El-Latif教授简介:Ahmed A. Abd El-Latif is a Professor at EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Saudi Arabia and a professor of Computer Science at Menoufia University, Egypt. He is author and co-author of more than 200+ papers, including refereed IEEE/ACM/Springer/Elsevier journals, conference papers, books and book chapters. He received many awards, State Encouragement Award in Engineering Sciences 2016, Arab Republic of Egypt; Young scientific award, Menoufia University, Egypt 2014. He is a fellow at Academy of Scientific Research and Technology, Egypt. His areas of interests are multimedia content encryption, secure wireless communication, IoT, applied cryptanalysis, perceptual cryptography, secret media sharing, information hiding, biometrics, forensic analysis in digital images, and quantum information processing. Prof. Ahmed Abd El-Latif is the chair/co-chair/program chair of some Scopus/ EI conferences. He is the EIC of International Journal of Information Security and Privacy, and series editor of Advances in Cybersecurity Management (https://www.routledge.com). Also, the academic editor/associate editor is in set of Scopus journals' quartile ranking. Currently, He had many books, more than 10 books, in several publishers in Springer, IET, CRC press, IGI-Global, Wiley, and IEEE.
报告摘要:Recently, there has been an increasing interest in a new classification of nonlinear dynamical systems, including two kinds of attractors: self-excited attractors and hidden attractors. Self-excited attractors can be localized straightforwardly by applying a standard computational procedure. In contrast, in systems with hidden attractors we have to develop a specific computational procedure to identify the hidden attractors because the equilibrium points do not help their localization. Especially systems with hidden attractors could play a vital role in the design of new advanced chaotic cryptosystems.
On the other hand, quantum computation is a rapidly growing field, and many breakthroughs have been achieved during the past decades. Quantum computation is transitioning from an emerging branch of science into a mature research field in science and engineering. Quantum walks, the quantum mechanical counterpart of classical random walks is an advanced tool for building quantum algorithms that have been recently shown to constitute a universal model of quantum computation. Additionally, quantum walks may be employed to develop quantum cryptography protocols as well as quantum networks. Quantum walks is now a solid field of quantum computation research full of exciting open problems for physicists, computer scientists and engineers.
Furthermore, nowadays, cybersecurity, which is the practice of protecting systems, networks, and programs from digital attacks, is becoming more prevalent. Cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Therefore, implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, while the attackers are becoming more innovative.
欢迎各位老师同学届时参加!