Seminars

2007 Seminars

December

  • Low Complexity Normal Bases
    David Thomson, University of Waterloo
    December 5 (Wednesday): 4:00 - 5:00 pm, DC 1331
November
  • Hybrid HIBE Protocol Secure Against Addaptive Attacks
    Sanjit Chatterjee, University of Waterloo
    November 28 (Wednesday): 4:00 - 5:00 pm, DC 1331
  • Security Arguments for the UM Key Agreement Protocol in the NIST SP800-56A Standard
    Berkant Ustaoglu, University of Waterloo
    November 21 (Wednesday): 4:00 - 5:00 pm, DC 1331
  • New Nonlinear Functions for S-Boxes in Cryptography and their Fourier Transform
    Gary McGuire, University College Dublin
    November 16 (Friday): 3:30 - 4:30 pm, MC 5158
October
  • Improved User Authentication in Off-The-Record Messaging Christopher Alexander, University of Waterloo
    October 24 (Wednesday): 4:00 - 5:00 pm, DC 1331
  • Combating Adverse Selection in Anonymity Networks
    Jeremy Clark, University of Waterloo
    October 17 (Wednesday): 4:00 - 5:00 pm, DC 1331
September
  • Algebraic Feedback Shift Registers
    Andrew Kapper, University of Kentucky
    September 28 (Friday): 10:00 - 11:00 am, MC 5158
  • Anonymity and Security in Delay Tolerant Networks
    Aniket Kate, University of Waterloo
    September 12 (Wednesday): 3:30 - 4:00 pm, DC 1331
  • Secure Crash Reporting in Vehicular Adhoc Networks
    Sumair Ur Rahman, University of Waterloo
    September 12 (Wednesday): 3:00 - 3:30 pm, DC 1331
  • Cryptographic Research on Digital Signatures
    Lein Harn, University of Missouri
    September 7 (Friday): 3:00 - 4:00 pm, EIT 1015
August
  • On New Weaknesses of the RC4 Stream Cipher
    Goutam Paul, Jadavpur University
    August 22 (Wednesday): 1:30 - 2:30 pm, DC 1331
  • An Introduction to Pairings
    Mike Scott, Dublin City University
    August 14 (Tuesday): 3:00 - 4:00 pm, DC 1331
  • Library for Prototyping the Computer Arithmetic Level in Crypto Applications
    Arnaud Tisserand, CNRS
    August 10 (Friday): 10:30 - 11:30 am, EIT 3142
  • Threshold Schemes in Byzantine Agreement
    Jonathan Hammell, University of Calgary
    August 1 (Wednesday): 1:30 - 2:30 pm, MC 5136
July
  • An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol
    Jiang Wu, University of Waterloo
    July 25 (Wednesday): 1:30 - 2:30 pm, DC 1331
  • A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
    Dan Brown, Certicom Corp.
    July 18 (Wednesday): 1:30 - 2:30 pm, DC 1331
  • Pairing-Based Onion Routing
    Aniket Kate, University of Waterloo
    July 4 (Wednesday): 1:30 - 2:30 pm, DC 1331
June
  • Implementation of pairing-based protocols based on supersingular elliptic curves
    Darrel Hankerson, Auburn University
    June 13 (Wednesday): 1:30 - 2:30 pm, DC 1331
  • Louis, Lester and Pierre: Three Protocols for Location Privacy
    Ge Zhong, University of Waterloo
    June 6 (Wednesday): 1:30 - 2:30 pm, DC 1331
May
  • Trust Enhanced Secure Routing in Mobile Ad hoc Networks
    Venkat Balakrishnan, Macquarie University
    May 24 (Thursday): 1:30 - 2:30 pm, DC 1331
  • Trusted Computing - what's all the fuss?
    Shane Balfe, Royal Holloway, University of London
    May 17 (Thursday): 1:30 - 2:30 pm, DC 1304
April
  • Pairing-friendly elliptic curves for cryptography
    Edlyn Teske, University of Waterloo
    April 18 (Wednesday): 1:30 - 2:30 pm, MC 5136
  • Securing wireless networks with resource-constrained devices
    Yuguang Fang, University of Florida
    April 16 (Monday): 10:30 - 12:00 pm, EIT 3151
  • Power analysis attacks on elliptic curve cryptosystems and key randomization countermeasure
    Nevine Ebeid, University of Waterloo
    April 12 (Thursday): 9:30 - 11:00 am, DC 1304
  • On the security of some variants of RSA
    Jason Hinek, University of Waterloo
    April 11 (Wednesday): 10:00 - 11:30 am, MC 5158
  • Improving the robustness of private information retrieval
    Ian Goldberg, University of Waterloo
    April 4 (Wednesday): 1:30 - 2:30 pm, DC 1331
March
  • A simple and unified approach of proving several security notions related to indistinguishability
    Mridul Nandi, University of Waterloo
    March 28 (Wednesday): 1:30 - 2:30 pm, MC 5158
  • Some nice applications of lattice basis reduction
    Jason Hinek, University of Waterloo
    March 21 (Wednesday): 1:30 - 2:30 pm, DC 1331
  • Authorship proof for textual document
    Jiang Wu, University of Waterloo
    March 14 (Wednesday): 1:30 - 2:30 pm, DC 1331
  • PunchScan: The first truly-practical voter-verifiable election system
    David Chaum
    March 7 (Wednesday): 1:30 - 2:30 pm, MC 5136
February
  • Security failures in electronic voting machines
    J. Alex Halderman, Princeton University
    February 28 (Wednesday): 1:30 - 2:30 pm, MC 5158
  • A new interactive two-channel message authentication protocol
    Atefeh Mashatan, University of Waterloo
    February 14 (Wednesday): 1:30 - 2:30 pm, DC 1331
January
  • Validation - or why not to trust incoming messages
    Berkant Ustaoglu, University of Waterloo
    January 31 (Wednesday): 1:30 - 2:30 pm, DC 1331