The conference on "Geometric and Asymptotic Group Theory with Applications" will be devoted to the study of a variety of topics in geometric and combinatorial group theory, with special emphasis on asymptotic and probabilistic methods and their applications. More specifically, the topics include: group actions, quasi-isometries, isoperimetric functions, growth, asymptotic invariants, random walks, algorithmic problems, etc. Applications will be emphasized, especially those concerning complexity theory and information security. Building a solid mathematical foundation for the use of infinite groups in cryptography will inevitably involve operating with various asymptotic and statistical aspects of infinite groups, and this is where modern group theory finds its important applications.
What makes this conference stand out compared to other conferences on geometric and/or asymptotic group theory is the emphasis on applications to other areas of science and to real-life problems. More specifically, we are going to emphasize applications that concern complexity theory and information security, in particular cryptography. Cryptography and cryptographic protocols have become a key element of information systems, protecting data and communications to ensure confidentiality, integrity and authenticity of data. While most symmetric key systems (block ciphers such as DES and AES and stream ciphers) have relatively modest mathematical requirements, asymmetric or public key systems, as well as cryptographic protocols, have become increasingly mathematically sophisticated, and, in particular, the emerging "non-commutative cryptography" exploits various properties of non-abelian infinite groups in very non-trivial ways.