Seminars

2009 Seminars

The Cryptography Seminar is being organized by Greg Zaverucha, Marcio Juliato, and Koray Karabina

December

  • Privacy-preserving Queries over Relational Databases
    Femi Olumofin, University of Waterloo
    December 10 (Thursday), 1:30 pm - 2:30 pm, DC 1331
  • Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
    Sherman Chow, New York University
    December 3 (Thursday), 1:30 pm - 2:30 pm, DC 1304
  • On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations
    Periklis Papakonstantinou, University of Toronto
    December 1 (Tuesday), 1:30 pm - 2:30 pm, MC 5158
November
  • New Ternary and Quaternary Sequences with Two-Level Autocorrelation
    Honggang Hu, University of Waterloo
    November 12 (Thursday), 1:30 pm - 2:30 pm, EIT 3145
October
  • Towards Attribute-Based Encryption Without Key Delegation
    Jason Hinek, University of Calgary
    October 1 (Thursday), 1:30 pm - 2:30 pm, DC 1302
  • The Idemix Anonymous Credential System
    Greg Zaverucha, University of Waterloo
    October 15 (Thursday), 1:30 pm - 2:30 pm
  • How Cryptosystems Are Really Broken
    Adi Shamir, Weizmann Institute
    October 22 (Thursday): 4:00 - 5:00 pm, DC 1351
    (CS Distinguished Lecture Series Seminar)
  • Plumbing 101: How to Deal With a Small Cryptographic Leakage
    Adi Shamir, Weizmann Institute
    October 23 (Friday): 3:30 - 4:30 pm, MC 5158
  • Multi-party Off-the-Record Messaging
    Berkant Ustaoglu, NTT Japan
    October 29 (Thursday): 1:30 - 2:30 pm, DC 1331
September
  • Sum-Product Problem: New Generalisations and Applications
    Igor Shparlinski, Macquarie University
    September 18 (Friday): 3:30 - 4:30 pm, MC 5158
August
  • Cryptographic Applications of Indifferentiability via Leaking Random Oracle Models
    Kazuo Ohta, University of Electro-Communications
    August 12 (Wednesday): 2:30 - 3:30 pm, MC 2018B
July
  • Sphinx: A Compact and Provably Secure Mix Format
    Ian Goldberg, University of Waterloo
    July 22 (Wednesday): 2:30 - 3:30 pm, MC 5136
  • Modeling Jamming Attacks on Wireless Networks
    Radha Poovendran, University of Washington
    July 27 (Monday): 3:00 pm - 4:00 pm, DC 1302
June
  • Distributed Key Generation for the Internet
    Aniket Kate, University of Waterloo
    June 15 (Monday): 2:00 - 3:00 pm, DC 1304
  • Isogenies in Cryptography
    Francois Morain, l'École Polytechnique
    June 17 (Wednesday): 2:30 - 3:30 pm, MC 5136
May
  • Peer-to-peer Anonymous Communication: Approaches and Pitfalls
    Nikita Borisov, University of Illinois at Urbana-Champaign
    May 8 (Friday): 2:30 - 3:30 pm, MC 5158
  • The Standardization of NTRUEncrypt
    Nick Howgrave-Graham, NTRU
    May 20 (Wednesday): 2:30 - 3:30 pm, MC 5158
  • Isogeny Computation in Small Characteristic
    Luca De Feo, l'École Polytechnique
    May 22 (Friday): 2:30 - 3:30 pm, MC 2018A
  • Anonymous Key Agreement in an Identity-Based Infrastructure
    Aniket Kate, University of Waterloo
    May 27 (Wednesday): 2:30 - 3:30 pm, MC 5136
  • Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem
    David Jao, University of Waterloo
    May 29 (Friday): 3:30 - 4:30 pm, MC 5158
April
  • Comparing Two Pairing-Based Aggregate Signature Schemes
    Ed Knapp, University of Waterloo
    April 6 (Monday): 1:30-2:00 pm, DC 1331
March
  • Efficient Fault Tolerant SHA-2 Hash FUnctions for Space Applications
    Marcio Juliato, University of Waterloo
    March 2 (Monday): 4:30-5:00 pm, EIT 3142
  • Plaintext Recovery Attacks Against SSH
    Kenny Paterson, Royal Holloway College
    March 4 (Wednesday): 1:30-2:30 pm, DC 1302
  • Faster Scalar Multiplication using the Multibase NAF Method
    Patrick Longa, University of Waterloo
    March 12 (Thursday): 2:30-3:30 pm, DC 1331
  • PLINKO: Polling with a Physical Implementation of a Noisy Channel
    Chris Alexander, University of Waterloo
    March 30 (Monday): 1:30-2:30 pm, DC 1331
February
  • Private Intersection of Certified Sets
    Greg Zaverucha, University of Waterloo
    February 18 (Wednesday): 1:30-2:30 pm, DC 1302
  • Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks
    Guang Gong, University of Waterloo
    February 20 (Friday): 2:30-3:30 pm, DC 1304
  • Cutting Edge Cases in Digital Privacy and Crime
    Jennifer Granick, Electronic Frontier Foundation
    February 23 (Monday): 1:30-2:30 pm, DC 1304
January
  • Pseudopowers and pswudosquares
    Igor Shparlinski, Macquarie University
    January 22 (Thursday): 3:30-4:30 pm, MC 5136
  • Fermat quotients
    Igor Shparlinski, Macquarie University
    January 23 (Friday): 3:30-4:30 pm, MC 5158
  • Class invariants
    Francois Morain, l'École Polytechnique
    January 29 (Thursday): 3:30-4:30 pm, MC 5136