Seminars
2008 Seminars
The Cryptography Seminar is being organized by
Koray Karabina, and
Aniket Kate,
and Marcio
Juliato.
November
- Message recognition protocols for ad hoc networks
Atefeh Mashatan, University of Waterloo
November 11 (Tuesday): 4:00-5:00 pm, DC 1331
- Constructing expander graphs from the Generalized Riemann Hypothesis
David Jao, University of Waterloo
November 28 (Friday): 3:30-4:30 pm, MC 5158
October
- A SEU-sesistant, FPGA-based implementation of the
substitution transformation in AES for security on satellites
Solmaz Ghaznavi, University of Waterloo
October 2 (Thursday): 3:00-4:00 pm, DC 1331
September
- Improving Tor using a TCP-over-DTLS tunnel
Joel Reardon, University of Waterloo
September 18 (Thursday): 3:00-4:00 pm, DC 1331
- SEU-Resistant SHA-256 Design for Security in Satellites
Marcio Juliato, University of Waterloo
September 30 (Tuesday): 4:00-5:00 pm, DC 1331
August
- The theory and applications of homomorphic cryptography
Kevin Henry, University of Waterloo
August 19 (Tuesday): 2:00-3:00 pm, DC 1331
- Bit security of elliptic curve Diffie-Hellman secret keys
Dimitar Jetchev, Institute des Hautes Etudes Scientifiques, France
August 22 (Friday): 3:30-4:30 pm, MC 5158
July
- Aspects of key management in wireless sensor networks
Maura Paterson, Royal Holloway, University of London
July 2 (Wednesday): 1:30-2:30 pm, DC 1331
- A user study of Off-the-Record Messaging
Ryan Stedman, University of Waterloo
July 9 (Wednesday): 1:30-2:30 pm, DC 1331
- Distributed approaches for location privacy
Ge Zhong, University of Waterloo
July 16 (Wednesday), 1:30-2:30 pm, DC 1331
- Pairing computation on genus 2 hyperelliptic curves
Xinxin Fan, University of Waterloo
July 23 (Wednesday), 1:30-2:30 pm, DC1331
- One-more discrete logarithm problems
Alfred Menezes, University of Waterloo
July 25 (Friday): 3:30-4:30 pm, MC 5158
- Multi-factor password authenticated key exchange
Douglas Stebila, University of Waterloo
July 30 (Wednesday): 1:30-2:30 pm, DC 1331
June
- On achieving security and privacy preservation for vehicular
communications
Chengxi Zhang, University of Waterloo
June 9 (Monday): 4:00-5:00 pm, EIT 3142
- Statistical models for intrusion detection systems
Alvaro Cardenas, University of California
June 10 (Tuesday): 11:00 am-12:00 pm, EIT 3142
- An approach for recovering satellites and their cryptographic
capabilities in the presence of SEUs and attacks
Marcio Juliato, University of Waterloo
June 11 (Wednesday): 1:30-2:30 pm, DC 1331
- Key establishment -- goals, security arguments and applications
Berkant Ustaoglu, University of Waterloo
June 13 (Friday): 3:30-4:30 pm, MC 5158
- Addressing two challenges in access control
Mahesh Tripunitara, Purdue University
June 18 (Wednesday): 11:00 am-12:00 pm, EIT 3142
- Key predistribution and random intersection graphs
Simon Blackburn, Royal Holloway, University of London
June 25 (Wednesday): 1:30-2:30 pm, DC 1331
May
- On elliptic curves with embedding degrees k=3, 4 and 6
Koray Karabina, University of Waterloo
May 14 (Wednesday): 1:30-2:30 pm, MC 5158
April
- Towards eradicating phishing attacks
Stefan Saroiu, University of Toronto
April 8 (Tuesday): 11:00-12:00 pm, DC 1304
- Parallel multiplier designs for the Galois/counter mode of operation
Pujan Patel, University of Waterloo
April 24 (Thursday): 10:00-11:00 am, CEIT 3151
- A security analysis of some physical content distribution systems
Jiayuan Sui, University of Waterloo
April 30 (Wednesday): 1:30-2:30 pm, MC 5158
March
- Side-channel monitoring of contactless Java cards
Jem Berkes, University of Waterloo
March 12 (Wednesday): 1:30-2:30 pm, MC 5158
- A new family of multibase methods for efficient scalar multiplication
Patrick Longa, University of Waterloo
March 19 (Wednesday): 1:30-2:30 pm, MC 5158
- Minimum node degree and k-connectivity for key predistribution
schemes and distributed sensor networks
Jiang Wu, University of Waterloo
March 26 (Wednesday): 1:30-2:30 pm, MC 5158
February
- Linear complexity and autocorrelation of prime cube sequences
Hongyeop Song, Yonsei University, Korea
February 5 (Tuesday): 10:00-11:00 am, DC 1304
- Automatically generating and defending against exploits by binary
code analysis
David Brumley, Carnegie Mellon University
February 20 (Wednesday): 11:00-12:00 pm, DC 1302
- Elliptic curve Diffie-Hellman bits
David Jao, University of Waterloo
February 27 (Wednesday): 1:30-2:30 pm, MC 5158
January
- Low complexity normal bases
David Thomson, University of Waterloo
January 16 (Wednesday): 1:30-2:30 pm, MC 5158
- Subquadratic binary field multiplier using double polynomial system
Christophe Negre, University of Perpignan, France
January 25 (Friday): 11:00-12:00 pm, EIT 3142

|