Seminars
2002 Seminars
January
 A conditional analysis of the elliptic curve digital signature algorithm
Daniel Brown, Certicom, Inc.
Jan 11 (Friday), 9:30 am, MC 5158
 Attacking Elliptic Curve Cryptosystems
Edlyn Teske, University of Waterloo
Jan 16 (Wednesday), 9:30 am, MC 5158
 Explicit Bounds and Cryptographic Applications
Andreas Stein, University of Illinois at UrbanaChampaign
Jan 18 (Friday), 9:30 am, MC 5158
 Some general techniques for analysing quantum computational phenomena
Ashwin Nayak, California Institute of Technology
Jan 21 (Monday), 9:30 am, MC 5158
 Entanglement in arrays of qubits for quantum computing
Viv Kendon, Blackett Laboratory, Imperial College, London, UK
Jan 21 (Monday), 3:30 pm, MC 5136
February
 Slope packings & coverings, and generic algorithms for the discrete
logarithm problem
Doug Stinson, University of Waterloo
Feb 4 (Monday), 3:30 pm, MC 5136
 Two attacks on smallexponent multiprime RSA
M. Jason Hinek, University of Waterloo
Feb 18 (Monday), 3:30 pm, MC 5136
 Introduction to Entanglement in Quantum Mechanics
Hilary Carteret, University of Waterloo
Feb 25 (Monday), 3:30 pm, MC 5136
 Linear Complexity of Sequences over Unknown Symbol Sets and Constructions
of Sequences over GF(p^{k}) whose Characteristic Polynomials
are over GF(p)
HongYeop Song, Yonsei University, Korea
Feb 27 (Wednesday), 3:30 pm, MC 5136
March
 Introduction to Entanglement in Quantum Mechanics, Part II
Hilary Carteret, University of Waterloo
Mar 4 (Monday), 2:30 pm, MC 5158
 The Feynman Propagator from a Single Path
Garnet Ord, Ryerson University
Mar 4 (Monday), 3:30 pm, MC 5136
 Attacks on 3 and 4Prime RSA with Low Private Exponent or MediumSized
Public Exponent
Mo King Low, University of Waterloo
Mar 11 (Monday), 3:30 pm, MC 5136
 Quantum protocols for twoparty cryptographic tasks
Robert Spekken, University of Toronto
Mar 18 (Monday), 3:30 pm, MC 5136
 Building Secure Software: How to Avoid Security Problems the Right Way
Gary McGraw, Cigital
Mar 20 (Wednesday), 2:30 pm, DC 1302
 Unconditionally Secure Distributed Oblivious Transfer
Paolo D'Arco, University of Waterloo
Mar 25 (Monday), 3:30 pm, MC 5136
 Quantum information processing using particles statistics
Vlatko Vedral, Imperial College, UK
Mar 28 (Thursday), 1:30 pm, MC 5158
April
 Quantum oneway permutations
Elham Kashefi, Imperial College, UK
Apr 2 (Tuesday), 2:30 pm, MC 5136
 A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding
M. Jason Hinek, University of Waterloo
Apr 8 (Monday), 3:30 pm, MC 5136
May
 A New Family of Goldlike Sequences
Khoongming Khoo, University of Waterloo
May 6 (Monday), 3:30 pm, MC 5136
 Polynomialtime Quantum Algorithms for Pell's Equation and the Principal
Ideal Problem
Sean Hallgren, Caltech University, USA
May 13 (Monday), 3:30 pm, DC 1304
 Computing Certain Invariants in Real Quadratic Number Fields
Hugh Williams, University of Calgary
May 16 (Thursday), 3:30 pm, MC 5158
 Quantum Software Resuability  New Twists in Quantum Circuit Design
Martin Roetteler, University of Karlsruhe, Germany
May 22 (Wednesday), 3:30 pm, DC 1304
June
 Overview of SideChannel and Other Implementation Attacks
Alfred Menezes, University of Waterloo
June 4 (Tuesday), 2:00 pm, MC 5045
 Recovering Digital Signature Keys from Partial Leakage of Ephemeral Keys
John Proos, University of Waterloo
June 20 (Thursday), 3:00 pm, MC 5045
July
 Introduction to SPA and DPA
James Muir, University of Waterloo
July 4 (Thursday), 3:00 pm, MC 5045
 Power Analysis Attacks and their Countermeasures for ECC
Anwar Hasan, University of Waterloo
July 18 (Thursday), 3:00 pm, MC 5045
August
 Further Countermeasures Against DPA Attacks on ECC
Anwar Hasan, University of Waterloo
August 1 (Thursday), 3:00 pm, MC 5045
 Wireless Security
Herb Little, Research In Motion
August 6 (Tuesday), 11:00 am, DC 1304
 PRIMES is in P
Edlyn Teske, University of Waterloo
August 21 (Wednesday), 2:00 pm, MC 5136
September
 Open NumberTheoretic Questions Related to the Gap DiffieHellman Signature
Scheme
Neal Koblitz, University of Washington
Sept 16 (Monday), 3:30 pm, MC 5136
 RingBases Binary Sequences
Zong duo Dai, Chinese Academy of Sciences
Sept 26 (Thursday), 10:00 am, DC 1302
 Overview of Quantum Error Correction
Raymond Laflamme, University of Waterloo
Sept 30 (Monday), 4:00 pm, PHYS 352
October
 Some Security Aspects of the Mist Randomized Exponentiation Algorithm
Jaewook Chung, University of Waterloo
Oct 3 (Thursday), 3:30 pm, MC 5045
 Randomized AdditionSubtraction Chains as a Countermeasure Against
Power Attacks
Nevine Ebeid, University of Waterloo
Oct 17 (Thursday), 3:30 pm, MC 5045
 Cryptosystems Based on Hyperelliptic Curves with Efficiently Computable
Automorphisms
Michael La Croix, University of Waterloo
Oct 21 (Monday), 3:30 pm, MC 5136
 Cryptanalysis of Stream Ciphers  A Survey
Shaoquan Jiang, University of Waterloo
Oct 28 (Monday), 3:30 pm, MC 5136
November
 Recovering Lost Efficiency of Exponentiation Algorithms on Smart Cards
Arash ReyhaniMasoleh, University of Waterloo
Nov 7 (Thursday), 3:30 pm, MC 5045
December
 Fault analysis attacks
Shaoquan Jiang, University of Waterloo
Dec 5 (Thursday), 3:30 pm, MC 5045
