Cryptology Workshop


CAM 2005, a national conference on applied mathematics, will be held on the weekend of June 10-11, 2005 on the University of Central Oklahoma campus in Edmond, Oklahoma. The conference is sponsored by the Department of Mathematics & Statistics and is funded by the National Security Agency. The conference will begin at 2 p.m. on Friday afternoon, June 10th and end at five p.m. on Saturday, June 11th.


This year the conference will take the form of a cryptology workshop designed for 

the nonspecialist. The workshop will begin with 3 lectures with the intention of giving someone with no background in cryptology an introduction to the subject. The workshop will be of interest to graduate students, advanced undergraduate students, and faculty who are not experts in cryptology. The speakers will be D. J. Bernstein (University of Illinois at Chicago), Robert Lewand (Goucher College), and Alice Silverberg (University of California at Irvine).


Travel funds are available to deter the expenses of participants. Graduate students, junior faculty, women, minorities, and persons with disabilities are especially encouraged to participate and to apply for support. Early application for support is encouraged.


For further information or to apply for support, contact an organizer:


Dr. Jesse Byrne, 100 N University Drive, Edmond, OK 73034; e-mail:; tel: 405-974-5575 or Dr. Charlotte Simmons, 100 N University Drive, Edmond, OK 73034; e-mail:; tel: 405-974-5316.


Speaker Biographies


Dr. Robert Lewand is Professor of Mathematics and Computer Science at Goucher College where his work has been recognized with awards for both outstanding teaching and research. He is the author of Cryptological Mathematics and co-author of several books on artificial intelligence. Dr. Lewand was awarded the 2002 John M. Smith Prize for Distinguished College or University Teaching by the Maryland-DC-Virginia Section of the MAA. His Ph.D. is from the University of Virginia.


Dr. Alice Silverberg is Professor of Mathematics and Computer Science at the University of California at Irvine. She earned her Ph.D. from Princeton in 1984. Dr. Silverberg has held Humboldt, Sloan, Bunting, IBM, and NSF Fellowships and an MSRI Research Professorship, and has had visiting research positions at Harvard, Berkeley, Bell Labs Research Silicon Valley, IBM in Yorktown Heights, the Institute for Advanced Study in Princeton, and in Australia, Europe, and Japan. She has given more than 200 invited talks worldwide.


Dr. Daniel J. Bernstein is Professor of Mathematics, Statistics, and Computer Science at the University of Illinois at Chicago. He completed his Ph.D. at the University of California at Berkeley in 1995. Dr. Bernstein was a Sloan Research Fellow and has held visiting positions at MSRI and at the University of Sydney. He has received numerous grants from the NSF and has given invited addresses across the US and in France, Germany, London, Canada, Australia, Austria and China. Dr. Bernstein is the author of the computer software qmail and djbdns, and a proponent of license-free software. As a result of the court case Bernstein v. United States, software was declared protected speech under the First Amendment and national restrictions on encryption software were overturned.

Cryptology Conference


Friday, June 10, 2005


2:00 - 2:50                               Monoalphabetic Substitution Ciphers                      Dr. Robert Lewand


(includes mathematical underpinnings of cryptology, additive, multiplicative, affine and keyword schemes)


3:00 – 3:50                                Polyalphabetic Substitution Ciphers, Part 1            Dr. Robert Lewand


(includes the Vigenère Square)

3:50 - 4:10        Refreshments                                                                          


4:10 - 5:00                              Polyalphabetic Substitution Ciphers, Part 2              Dr. Robert Lewand


(includes Playfair's System and Hill's System)


Saturday, June 11, 2005


9:00 - 9:30         Coffee and Doughnuts


9:30 - 10:15                                      The RSA Algorithm                                          Dr. Robert Lewand


(includes how it works, why it works, and (time permitting) some variations on the system).



10:30 - 11:30                                         KEYNOTE ADDRESS

Dr. D. J. Bernstein, University of Illinois at Chicago



11:30 - 1:30       Lunch


1:30 - 2:30                               CRITTENDON DISTINGUISHED LECTURE

Dr. Alice Silverberg, University of California at Irvine



2:40 - 3:25                                                       Title: TBA                                            Dr. D. J. Bernstein



3:45 - 4:30                                                        Title: TBA                                         Dr. Alice Silverberg