2002 Seminars


  • A conditional analysis of the elliptic curve digital signature algorithm
    Daniel Brown, Certicom, Inc.
    Jan 11 (Friday), 9:30 am, MC 5158
  • Attacking Elliptic Curve Cryptosystems
    Edlyn Teske, University of Waterloo
    Jan 16 (Wednesday), 9:30 am, MC 5158
  • Explicit Bounds and Cryptographic Applications
    Andreas Stein, University of Illinois at Urbana-Champaign
    Jan 18 (Friday), 9:30 am, MC 5158
  • Some general techniques for analysing quantum computational phenomena
    Ashwin Nayak, California Institute of Technology
    Jan 21 (Monday), 9:30 am, MC 5158
  • Entanglement in arrays of qubits for quantum computing
    Viv Kendon, Blackett Laboratory, Imperial College, London, UK
    Jan 21 (Monday), 3:30 pm, MC 5136
  • Slope packings & coverings, and generic algorithms for the discrete logarithm problem
    Doug Stinson, University of Waterloo
    Feb 4 (Monday), 3:30 pm, MC 5136
  • Two attacks on small-exponent multi-prime RSA
    M. Jason Hinek, University of Waterloo
    Feb 18 (Monday), 3:30 pm, MC 5136
  • Introduction to Entanglement in Quantum Mechanics
    Hilary Carteret, University of Waterloo
    Feb 25 (Monday), 3:30 pm, MC 5136
  • Linear Complexity of Sequences over Unknown Symbol Sets and Constructions of Sequences over GF(pk) whose Characteristic Polynomials are over GF(p)
    Hong-Yeop Song, Yonsei University, Korea
    Feb 27 (Wednesday), 3:30 pm, MC 5136
  • Introduction to Entanglement in Quantum Mechanics, Part II
    Hilary Carteret, University of Waterloo
    Mar 4 (Monday), 2:30 pm, MC 5158
  • The Feynman Propagator from a Single Path
    Garnet Ord, Ryerson University
    Mar 4 (Monday), 3:30 pm, MC 5136
  • Attacks on 3- and 4-Prime RSA with Low Private Exponent or Medium-Sized Public Exponent
    Mo King Low, University of Waterloo
    Mar 11 (Monday), 3:30 pm, MC 5136
  • Quantum protocols for two-party cryptographic tasks
    Robert Spekken, University of Toronto
    Mar 18 (Monday), 3:30 pm, MC 5136
  • Building Secure Software: How to Avoid Security Problems the Right Way
    Gary McGraw, Cigital
    Mar 20 (Wednesday), 2:30 pm, DC 1302
  • Unconditionally Secure Distributed Oblivious Transfer
    Paolo D'Arco, University of Waterloo
    Mar 25 (Monday), 3:30 pm, MC 5136
  • Quantum information processing using particles statistics
    Vlatko Vedral, Imperial College, UK
    Mar 28 (Thursday), 1:30 pm, MC 5158
  • Quantum one-way permutations
    Elham Kashefi, Imperial College, UK
    Apr 2 (Tuesday), 2:30 pm, MC 5136
  • A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding
    M. Jason Hinek, University of Waterloo
    Apr 8 (Monday), 3:30 pm, MC 5136
  • A New Family of Gold-like Sequences
    Khoongming Khoo, University of Waterloo
    May 6 (Monday), 3:30 pm, MC 5136
  • Polynomial-time Quantum Algorithms for Pell's Equation and the Principal Ideal Problem
    Sean Hallgren, Caltech University, USA
    May 13 (Monday), 3:30 pm, DC 1304
  • Computing Certain Invariants in Real Quadratic Number Fields
    Hugh Williams, University of Calgary
    May 16 (Thursday), 3:30 pm, MC 5158
  • Quantum Software Resuability - New Twists in Quantum Circuit Design
    Martin Roetteler, University of Karlsruhe, Germany
    May 22 (Wednesday), 3:30 pm, DC 1304
  • Overview of Side-Channel and Other Implementation Attacks
    Alfred Menezes, University of Waterloo
    June 4 (Tuesday), 2:00 pm, MC 5045
  • Recovering Digital Signature Keys from Partial Leakage of Ephemeral Keys
    John Proos, University of Waterloo
    June 20 (Thursday), 3:00 pm, MC 5045
  • Introduction to SPA and DPA
    James Muir, University of Waterloo
    July 4 (Thursday), 3:00 pm, MC 5045
  • Power Analysis Attacks and their Countermeasures for ECC
    Anwar Hasan, University of Waterloo
    July 18 (Thursday), 3:00 pm, MC 5045
  • Further Countermeasures Against DPA Attacks on ECC
    Anwar Hasan, University of Waterloo
    August 1 (Thursday), 3:00 pm, MC 5045
  • Wireless Security
    Herb Little, Research In Motion
    August 6 (Tuesday), 11:00 am, DC 1304
  • PRIMES is in P
    Edlyn Teske, University of Waterloo
    August 21 (Wednesday), 2:00 pm, MC 5136
  • Open Number-Theoretic Questions Related to the Gap Diffie-Hellman Signature Scheme
    Neal Koblitz, University of Washington
    Sept 16 (Monday), 3:30 pm, MC 5136
  • Ring-Bases Binary Sequences
    Zong duo Dai, Chinese Academy of Sciences
    Sept 26 (Thursday), 10:00 am, DC 1302
  • Overview of Quantum Error Correction
    Raymond Laflamme, University of Waterloo
    Sept 30 (Monday), 4:00 pm, PHYS 352
  • Some Security Aspects of the Mist Randomized Exponentiation Algorithm
    Jaewook Chung, University of Waterloo
    Oct 3 (Thursday), 3:30 pm, MC 5045
  • Randomized Addition-Subtraction Chains as a Countermeasure Against Power Attacks
    Nevine Ebeid, University of Waterloo
    Oct 17 (Thursday), 3:30 pm, MC 5045
  • Cryptosystems Based on Hyperelliptic Curves with Efficiently Computable Automorphisms
    Michael La Croix, University of Waterloo
    Oct 21 (Monday), 3:30 pm, MC 5136
  • Cryptanalysis of Stream Ciphers - A Survey
    Shaoquan Jiang, University of Waterloo
    Oct 28 (Monday), 3:30 pm, MC 5136
  • Recovering Lost Efficiency of Exponentiation Algorithms on Smart Cards
    Arash Reyhani-Masoleh, University of Waterloo
    Nov 7 (Thursday), 3:30 pm, MC 5045
  • Fault analysis attacks
    Shaoquan Jiang, University of Waterloo
    Dec 5 (Thursday), 3:30 pm, MC 5045