2008 Seminars

The Cryptography Seminar is being organized by Koray Karabina, and Aniket Kate, and Marcio Juliato.


  • Message recognition protocols for ad hoc networks
    Atefeh Mashatan, University of Waterloo
    November 11 (Tuesday): 4:00-5:00 pm, DC 1331
  • Constructing expander graphs from the Generalized Riemann Hypothesis
    David Jao, University of Waterloo
    November 28 (Friday): 3:30-4:30 pm, MC 5158
  • A SEU-sesistant, FPGA-based implementation of the substitution transformation in AES for security on satellites
    Solmaz Ghaznavi, University of Waterloo
    October 2 (Thursday): 3:00-4:00 pm, DC 1331
  • Improving Tor using a TCP-over-DTLS tunnel
    Joel Reardon, University of Waterloo
    September 18 (Thursday): 3:00-4:00 pm, DC 1331
  • SEU-Resistant SHA-256 Design for Security in Satellites
    Marcio Juliato, University of Waterloo
    September 30 (Tuesday): 4:00-5:00 pm, DC 1331
  • The theory and applications of homomorphic cryptography
    Kevin Henry, University of Waterloo
    August 19 (Tuesday): 2:00-3:00 pm, DC 1331
  • Bit security of elliptic curve Diffie-Hellman secret keys
    Dimitar Jetchev, Institute des Hautes Etudes Scientifiques, France
    August 22 (Friday): 3:30-4:30 pm, MC 5158
  • Aspects of key management in wireless sensor networks
    Maura Paterson, Royal Holloway, University of London
    July 2 (Wednesday): 1:30-2:30 pm, DC 1331
  • A user study of Off-the-Record Messaging
    Ryan Stedman, University of Waterloo
    July 9 (Wednesday): 1:30-2:30 pm, DC 1331
  • Distributed approaches for location privacy
    Ge Zhong, University of Waterloo
    July 16 (Wednesday), 1:30-2:30 pm, DC 1331
  • Pairing computation on genus 2 hyperelliptic curves
    Xinxin Fan, University of Waterloo
    July 23 (Wednesday), 1:30-2:30 pm, DC1331
  • One-more discrete logarithm problems
    Alfred Menezes, University of Waterloo
    July 25 (Friday): 3:30-4:30 pm, MC 5158
  • Multi-factor password authenticated key exchange
    Douglas Stebila, University of Waterloo
    July 30 (Wednesday): 1:30-2:30 pm, DC 1331
  • On achieving security and privacy preservation for vehicular communications
    Chengxi Zhang, University of Waterloo
    June 9 (Monday): 4:00-5:00 pm, EIT 3142
  • Statistical models for intrusion detection systems
    Alvaro Cardenas, University of California
    June 10 (Tuesday): 11:00 am-12:00 pm, EIT 3142
  • An approach for recovering satellites and their cryptographic capabilities in the presence of SEUs and attacks
    Marcio Juliato, University of Waterloo
    June 11 (Wednesday): 1:30-2:30 pm, DC 1331
  • Key establishment -- goals, security arguments and applications
    Berkant Ustaoglu, University of Waterloo
    June 13 (Friday): 3:30-4:30 pm, MC 5158
  • Addressing two challenges in access control
    Mahesh Tripunitara, Purdue University
    June 18 (Wednesday): 11:00 am-12:00 pm, EIT 3142
  • Key predistribution and random intersection graphs
    Simon Blackburn, Royal Holloway, University of London
    June 25 (Wednesday): 1:30-2:30 pm, DC 1331
  • On elliptic curves with embedding degrees k=3, 4 and 6
    Koray Karabina, University of Waterloo
    May 14 (Wednesday): 1:30-2:30 pm, MC 5158
  • Towards eradicating phishing attacks
    Stefan Saroiu, University of Toronto
    April 8 (Tuesday): 11:00-12:00 pm, DC 1304
  • Parallel multiplier designs for the Galois/counter mode of operation
    Pujan Patel, University of Waterloo
    April 24 (Thursday): 10:00-11:00 am, CEIT 3151
  • A security analysis of some physical content distribution systems
    Jiayuan Sui, University of Waterloo
    April 30 (Wednesday): 1:30-2:30 pm, MC 5158
  • Side-channel monitoring of contactless Java cards
    Jem Berkes, University of Waterloo
    March 12 (Wednesday): 1:30-2:30 pm, MC 5158
  • A new family of multibase methods for efficient scalar multiplication
    Patrick Longa, University of Waterloo
    March 19 (Wednesday): 1:30-2:30 pm, MC 5158
  • Minimum node degree and k-connectivity for key predistribution schemes and distributed sensor networks
    Jiang Wu, University of Waterloo
    March 26 (Wednesday): 1:30-2:30 pm, MC 5158
  • Linear complexity and autocorrelation of prime cube sequences
    Hongyeop Song, Yonsei University, Korea
    February 5 (Tuesday): 10:00-11:00 am, DC 1304
  • Automatically generating and defending against exploits by binary code analysis
    David Brumley, Carnegie Mellon University
    February 20 (Wednesday): 11:00-12:00 pm, DC 1302
  • Elliptic curve Diffie-Hellman bits
    David Jao, University of Waterloo
    February 27 (Wednesday): 1:30-2:30 pm, MC 5158
  • Low complexity normal bases
    David Thomson, University of Waterloo
    January 16 (Wednesday): 1:30-2:30 pm, MC 5158
  • Subquadratic binary field multiplier using double polynomial system
    Christophe Negre, University of Perpignan, France
    January 25 (Friday): 11:00-12:00 pm, EIT 3142