Abstract
In this paper, I look back at my career as a mathematician and mathematical cryptographer, mainly concentrating on my student days and the early parts of my career. I also discuss my research philosophy and what I mean by the term “combinatorial cryptography.” Along the way, I recall some influential people, books and papers.
D. R. Stinson’s research is supported by NSERC Discovery grant RGPIN-03882.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
I did have to memorize the multiplication table, but this did not bother me.
- 2.
This quote is from the Wikipedia article “Conway’s Soldiers” (https://en.wikipedia.org/wiki/Conway’s_Soldiers), which is released under the Creative Commons Attribution-Share-Alike License 3.0.
- 3.
This quote is from the Wikipedia article “Murray S. Klamkin” (https://en.wikipedia.org/wiki/Murray_S._Klamkin), which is released under the Creative Commons Attribution-Share-Alike License 3.0.
- 4.
This is sometimes called a Minkowski diagram.
- 5.
Gus was another important influence on my career.
- 6.
Unconditional security is basically the same thing as being secure against an infinitely powerful adversary.
- 7.
I attribute this amusing term to Curt Lindner.
- 8.
This quote is from the Wikipedia article “Computers and Intractability” (https://en.wikipedia.org/wiki/Computers_and_Intractability), which is released under the Creative Commons Attribution-Share-Alike License 3.0.
- 9.
There is apparently no source to substantiate the claim that Einstein actually said this, but it is still a good quote.
- 10.
I should emphasize that I am not specifically criticizing the wording and notation in this definition. I am just using it to illustrate how complicated cryptographic definitions have become in recent years.
References
Bellovin, S.M.: Frank Miller: inventor of the one-time pad. Cryptologia 35, 203–222 (2011)
Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM J. Comput. 17, 210–229 (1988)
Blake, I.F., Fuji-Hara, R., Mullin, R.C., Vanstone, S.A.: Computing logarithms in finite fields of characteristic two. SIAM J. Algebraic Discrete Methods 5, 276–285 (1984)
Brian, G., Faonio, A., Venturi, D.: Continuously non-malleable secret sharing for general access structures. Cryptology ePrint Archive: Report 2019/602
Brickell, E.F.: A few results in message authentication. Congressus Numerantium 43, 141–154 (1984)
Delsarte, P.: The association schemes of coding theory. Ph.D. thesis, Université Catholique de Louvain, June 1973
Dinitz, J.H., Stinson, D.R.: A fast algorithm for finding strong starters. SIAM J. Algebraic Discrete Methods 2, 50–56 (1981)
Garey, M.R., Johnson, D.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman and Company, New York (1979)
Honsberger, R.: Ingenuity in Mathematics. Mathematical Association of America, Washington, DC (1975)
Honsberger, R.: Mathematical Morsels. Mathematical Association of America, New York (1979)
Mullin, R.C., Stinson, D.R., Wallis, W.D.: Concerning the spectrum of skew room squares. Ars Combinatoria 6, 277–291 (1978)
Ryser, H.: Combinatorial Mathematics. Mathematical Association of America, New York (1963)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)
Simmons, G.J. (ed.): Contemporary Cryptology: The Science of Information Integrity. IEEE Press, Piscataway (1992)
Stinson, D.R.: Some constructions and bounds for authentication codes. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 418–425. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_30
Stinson, D.R.: Resilient functions and large sets of orthogonal arrays. Congressus Numerantium 92, 105–110 (1993)
Stinson, D.R., Massey, J.L.: An infinite class of counterexamples to a conjecture concerning non-linear resilient functions. J. Cryptol. 8, 167–173 (1995)
Stinson, D.R., Vanstone, S.A.: A combinatorial approach to threshold schemes. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 330–339. Springer, Heidelberg (1988). https://doi.org/10.1007/3-540-48184-2_28
van Lint, J.H., Wilson, R.M.: A Course in Combinatorics, 2nd edn. Cambridge University Press, Cambridge (2001)
Wilson, R.M.: Constructions and uses of pairwise balanced designs. In: Hall, M., van Lint, J.H. (eds.) Combinatorics. ASIC, vol. 16, pp. 19–42. (1975). https://doi.org/10.1007/978-94-010-1826-5_2
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Stinson, D.R. (2020). Looking Back—My Life as a Mathematician and Cryptographer. In: Paterson, K., Stebila, D. (eds) Selected Areas in Cryptography – SAC 2019. SAC 2019. Lecture Notes in Computer Science(), vol 11959. Springer, Cham. https://doi.org/10.1007/978-3-030-38471-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-38471-5_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38470-8
Online ISBN: 978-3-030-38471-5
eBook Packages: Computer ScienceComputer Science (R0)