• End of Registration
  • -
  • Classes Start
  • may 23 2016
  • Classes End
  • jun 26 2016
  • Estimated Effort
  • 03:00 h/week
  • Language
  • English
« This course is available in « Open Archived » mode: there is no animation of the pedagogical team (no forum or rated exercises such as quizzes) and the course does not deliver any certificate of successful completion or certificate. However, you have unlimited access to the videos and text resources. This mode of distribution allows you, while waiting for the opening of a future "animated session", to train yourself by having access to the main contents.
Note that this is a subject close to research, and the field has evolved since the MOOC's creation. This evolution will continue. Everything that is said remains accurate and provides a good basis for anyone interested in the subject, but the gap with the state of the art is increasing over time.»

About This Course

We all use cryptography in our daily lives. The security of the most popular Public-Key Cryptosystems are based either on the hardness of factoring or the presumed intractability of the discrete logarithm problem. Advances on these problems or the construction of large quantum computers would dramatically change the landscape: Code-Based Cryptography is a powerful and promising alternative.

The objective of this course is to present the state of the art of these cryptosystems. This MOOC covers the essentials that you should know about this hot topic in Cryptography and Coding Theory: the security-reduction proofs, the possible attacks, several proposals to reduce the key-size, etc.

Targeted Audience

This course is intended for undergraduate and Master’s degree students in mathematics or computer science.

Postgraduate students and researchers from the disciplines of computer algebra, coding theory and cryptography can also benefit from this course.

More widely, mathematicians, physicists or engineers interested in information and communication technologies and every person who wants to know more about cryptography, coding theory or code-based cryptography can be interested in this course.


Knowledge about linear algebra, finite field and complexity theory is required.

Course Syllabus

  • Week 1: Error-Correcting Codes and Cryptography
  • Week 2: McEliece Cryptosystem
  • Week 3: Message Attacks (ISD)
  • Week 4: Key Attacks
  • Week 5: Other cryptographic constructions relying on coding theory

Course Teachers

Irene Marquez


Irene Márquez-Corbella is post-doctoral researcher of FSMP (Fondation Sciences Mathématiques de Paris) at Inria (France). Before she worked in the Inria Project-team GRACE (post-doctoral fellowship), the Coding and Cryptology group at the TUe and the UVa.
Research interests: Code-Based Cryptography, Coding Theory and Computer Algebra.

Nicolas Sendrier


Nicolas Sendrier obtained a Ph.D. (1991) and an "Habilitation à Diriger des Recherches" (2002) from University Paris 6. He has been a research scientist at Inria since 1992 and a senior research scientist since 2003.
Research interests: design and analysis of code-based cryptographic primitives.

Matthieu Finiasz

Matthieu FINIASZ

Matthieu Finiasz obtained his PhD from Inria in 2004. He then worked at EPFL before obtaining a research position at ENSTA-ParisTech. He is now a security expert at CryptoExperts (Paris).
Research interests: Code-Based Cryptography, and the various applications of Coding Theory to Cryptography (building blocks for symmetric cryptography, privacy protection...)

Course Organisation

The course contents are structured around 5 weeks, however all the contents will be available from the opening of the MOOC. Each week the teachers propose video lectures and exercises.

This session is open for ever. This is an archived Mooc.


We remind you that no attestation of achievement for this course will be delivered at the end of the course.

Conditions of Use

Conditions of Use of the Course Material

The course materials are, except otherwise mentioned, provided under Creative Commons License BY-NC-ND: the name of the author should always be mentioned ; the user can exploit the work except in a commercial context and he/she cannot make changes to the original work.

Conditions of Use of the content produced by participants

The content produced by paticipants are, except otherwise mentioned, under Creative Commons License BY-NC-ND: the name of the author should always be mentioned ; the user can exploit the work except in a commercial context and he/she cannot make changes to the original work.

This training course is produced by

logo inria recherche

Photo credits:
Video thumbnail: © Sergey Nivens - Fotolia.com
I. Marquez and N. Sendrier Pictures : © Inria - Guillaume Laidet
M. Finiasz Pictures: © M. Finiasz