Seminars

2018 Seminars

The CACR Seminar is being organized by Nik Unger (njunger [at] uwaterloo.ca), Yao Chen (y449chen [at] uwaterloo.ca), and Luis Ruiz-Lopez (luis.ruiz-lopez [at] uwaterloo.ca].

November

  • Fantastically bad laws and where to find them
    Nate Cardozo, Electronic Frontier Foundation
    November 2 (Fri), 2:30 - 3:30 pm, DC 1304
October
  • Designing efficient algorithms for combinatorial repairable threshold schemes
    Bailey Kacsmar, University of Waterloo
    October 11 (Thu), 10:00 - 11:00 am, DC 1304
  • Offline assisted group key exchange
    Gareth Davies , Norwegian University of Science and Technology
    October 12 (Fri), 10:30 - 11:15 am, MC 5417
  • Quantifying location privacy in location-based services
    Peiyuan Liu , University of Waterloo
    October 12 (Fri), 4:00 - 5:00 pm, DC 1331
September
  • Science of security -- could such a thing exist?
    Paul van Oorschot, Carleton University
    September 14 (Fri), 11:30 am - 12:30 pm, MC 5501
  • Evaluating the Australian government's legislative response to the encryption debate
    Adam Molnar, Deakin University
    September 25 (Tue), 3:00 - 4:00 pm, DC 1304
August
  • Quantum algorithms for the hidden subgroup problem (continued)
    Javad Doliskani, University of Waterloo
    August 3 (Fri), 1:30 - 2:30 pm, MC 6486
  • When a small leak sinks a great ship: deanonymizing Tor hidden service users through bitcoin transactions analysis
    Aiman Erbad, Qatar University
    August 9 (Thu), 3:00 - 4:00 pm, DC 1304
July
  • Where theory meets practice for privacy enhancing technologies
    Chelsea Komlo, HashiCorp
    July 9 (Mon), 2:30 - 3:30 pm, DC 1304
  • "Where's Waldo?" Privacy in the age of internet-connected mobile technology
    Matthew Finkel, The Tor Project
    July 10 (Tue), 2:30 - 3:30 pm, DC 1304
  • Quantum algorithms for the hidden subgroup problem
    Javad Doliskani, University of Waterloo
    July 12 (Thu), 3:00 - 4:00 pm, MC 6486
  • More threshold cryptography for users with multiple devices
    Erinn Atwater, University of Waterloo
    July 30 (Mon), 4:00 pm - 5:00 pm, DC 1304
  • Finding very damaging needles in very large haystacks
    Vern Paxson, University of California, Berkeley
    July 31 (Tue), 11:00 am - 12:00 pm, DC 1304
June
  • On isogeny graphs of supersingular elliptic curves over finite fields
    Gora Adj, University of Waterloo
    June 5 (Tue), 1:00 - 2:00 pm, MC 6486
  • On isogeny graphs of supersingular elliptic curves over finite fields II
    Gora Adj, University of Waterloo
    June 12 (Tue), 1:00 - 2:00 pm, MC 6486
  • Forensic analysis in access control - foundations and practice
    Nahid Juma, University of Waterloo
    June 27 (Wed), 11:00 - 12:00 pm, EIT 3145
  • Super-happy censorship-resistant fun pages
    Cecylia Bocovich, University of Waterloo
    June 28 (Thu), 2:30 - 3:30 pm, DC 2585
May
  • Efficient fully homomorphic encryption scheme
    Shuhong Gao, Clemson University
    May 10 (Thu), 11:00 - 12:00 pm, EIT 3142
  • A security reduction for the short integer solution problem
    Elena Bakos Lang, University of Waterloo
    May 22 (Tue), 1:00 - 2:00 pm, MC 6486
April
  • Private information retrieval: How to get something, without revealing what you got
    Sennur Ulukus, University of Maryland
    Apr 2 (Mon), 11:00 - 12:00 pm, E5 4106/4128
  • Quantum collision-finding in non-uniform random functions
    Ted Eaton, ISARA Corp.
    Faster isogeny-based compressed key agreement
    Geovandro Pereira, University of Waterloo
    NTRU-HRSS-KEM
    John Schank, University of Waterloo
    Apr 2 (Mon), 1:00 - 2:30 pm, MC 6486
  • Somebody think of the children: Examining COPPA compliance at scale
    Joel Reardon, University of Calgary
    Apr 19 (Thu), 2:30 - 3:30 pm, DC 1304
March
  • Automated Android security assessment
    Joshua Garcia, University of Califorina, Irvine
    Mar 1 (Thu), 10:30 - 11:30 am, EIT 3142
  • Enhancing the discovery and mitigation of vulnerabilities in binary programs
    Ruoyu Wang, University of Califorina, Santa Barbara
    Mar 6 (Tue), 10:30 - 11:30 am, DC 1304
  • Identifying and mitigating trust violations in the mobile ecosystem
    Antonio Bianchi, University of Califorina, Santa Barbara
    Mar 6 (Tue), 10:30 - 11:30 am, EIT 3142
  • Securing hardware-based trusted execution environment
    Sangho Lee, Georgia Institute of Technology
    Mar 8 (Thu), 10:30 - 11:30 am, DC 1304
  • LWE Part 1: The problem, the cryptosystem, and its relationsip to lattice problems
    Luis Ruiz, University of Waterloo
    Mar 12 (Mon), 1:30 - 3:00 pm, MC 6486
  • Google's ALTS
    Ed Knapp, Google
    Mar 26 (Mon), 11:30 am - 12:20 pm, RCH 101
  • LWE Part 2: A quantum discrete Gaussian sampler
    Luis Ruiz, University of Waterloo
    Mar 26 (Mon), 1:30 - 3:00 pm, MC 6486
  • Implementing cryptography at scale
    Ed Knapp, Google
    Mar 27 (Tue), 4:00 - 5:00 pm, MC 5501
  • Breaking cryptographic barriers
    Dakshita Khurana, UCLA
    Mar 28 (Wed), 10:30 - 11:30 am, DC 1304
February
  • ALBANIS: A brief overview of lattice-based NIST submissions
    Luis Ruiz, University of Waterloo
    Feb 5 (Mon), 1:00 - 2:00 pm, MC 6486
  • CSIS bulk data collection and national security surveillance
    Michael Vonn, BC Civil Liberties Association
    Feb 6 (Tue), 2:00 - 3:00 pm, DC 1304
  • Post-quantum group-based cryptography
    Delaram Kahrobaei, City University of New York
    Feb 9 (Fri), 3:30 - 4:30 pm, MC 5501
January
  • StyleCounsel: Seeing the (random) forest for the trees in adversarial code stylometry
    Chris McKnight, University of Waterloo
    Jan 5 (Fri), 3:00 - 4:00 pm, DC 2585
  • Next-generation authentication and key exchange protocols
    Douglas Stebila, McMaster University
    Jan 15 (Mon), 9:30 - 10:30 am, MC 5417
  • Are ideal lattices quantum-safe?
    Jean-François Biasse, University of South Florida
    Jan 22 (Mon), 9:30 - 10:30 am, QNC 1501
  • System security: from theory to practice under tampering and leakage
    Daniel Genkin, Penn State University
    Jan 23 (Tue), 10:30 - 11:30 am, DC 1304