Seminars

2010 Seminars

The Cryptography Seminar is being organized by Marcio Juliato, Ed Knapp and Femi Olumofin

December

  • Revisiting the Computational Practicality of Private Information Retrieval
    Femi Olumofin, University of Waterloo
    Dec 1 (Wed), 2:30 - 3:30 pm, MC 5158
  • Selections: An Internet Voting System with Over-the-shoulder Coercion Resistance
    Jeremy Clark, University of Waterloo
    Dec 3 (Fri), 2:30 pm - 3:30 pm, MC 5136
  • Nymbler: Privacy-enhanced Protection from Abuses of Anonymity
    Ryan Henry, University of Waterloo
    Dec 9 (Thu), 1:00 pm - 2:00 pm, DC 1331
  • Eperio: Mitigating Technical Complexity in Cryptographic Election Verificaiton
    Aleksander Essex, University of Waterloo
    Dec 10 (Fri), 2:30 pm - 3:30 pm, DC 1304
  • Preserving Access Privacy Over Large Databases
    Femi Olumofin, University of Waterloo
    Dec 15 (Wed), 2:30 - 3:30 pm, DC 1302
  • A Platform for Assessing the Efficiency of Distributed Access Enforcement in Role Based Access Control (RBAC) and Its Validation
    kMarko Komlenovic, University of Waterloo
    Dec 16 (Thu), 5:00 - 6:00 pm, EIT 3151/3153
  • Discrete Fourier Spectra Attacks on Stream Ciphers
    Honggang Hu, University of Waterloo
    Dec 17 (Fri), 2:30 - 3:30 pm, DC 1331
November
  • A New CRT-RSA Algorithm Resistant to Powerful Fault Attacks
    Nevine Ebeid, Certicom Corp.
    Nov 5 (Fri), 2:30-3:30 pm, EIT 3145
  • Generalized Lucas Sequences
    Qiang (Steven) Wang, Carleton University
    Nov 9 (Tue), 2:30-3:30 pm, EIT 3142
  • Dealing with Ghosts: Trading Robustness for Correctness and Privacy in Certain Multiparty Functions, Beyond an Honest Majority
    Stacey Jeffery, University of Waterloo
    Nov 12 (Fri), 2:30 - 3:30 pm, DC 1304
  • Constructing Elliptic Curve Isogenies in Quantum Subexponential Time
    David Jao, University of Waterloo
    Nov 19 (Fri), 3:30 - 4:30 pm, MC 5158
  • Hacking Democracy: An Election Fraudster's Tricks of the Trade
    Aleksander Essex, University of Waterloo
    Nov 26 (Fri), 2:30 - 3:30 pm, DC 1304
October
  • Toward Improving Tor's Security and Performance
    Kevin Bauer, University of Colorado
    Oct 22 (Fri), 2:30 pm, MC 5136
  • A New Correlation Frequency Analysis of the Side Channel
    Edgar Mateos Santillan, University of Waterloo
    Oct 20 (Wed), 1:30 pm, DC 1331
September
  • Privacy, Behavioral Economics, and the Control Paradox
    Alessandro Acquisti, Carnegie Mellon University
    Sep 24 (Fri), 4:15pm - 5:15 pm, MC 2036
  • Algorithm-level Error Detection for Elliptic Curve Scalar Multiplication
    Agustin Dominguez-Oviedo, ITESM Campus Queretaro, Mexico
    Sep 24 (Fri), 2:00 - 3:00 pm, EIT 3145
  • Soft Error Resistant Design of the AES Cipher Using SRAM-based FPGA
    Solmaz Ghaznavi, University of Waterloo
    Sep 23 (Thu), 2:00 - 3:00 pm, EIT 3151/3153
  • Generic Attacks on Hash Functions
    Jalaj Upadhyay, University of Waterloo
    Sep 22 (Wed), 11:00am - 12:00 pm, DC 1331
  • Bingo Voting - Verifiable Voting Scheme Based on a Trusted Random Number Generator
    Christian Henrich, Karlsruhe Institute of Technology
    Sep 9 (Thu), 1:00pm - 2:00 pm, EIT 3142
August
  • Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets
    Diego de Freitas Aranha, Univ. of Campinas/Univ. of Waterloo
    Aug 5 (Thu), 1:30pm - 2:30pm, MC 5158
July
  • Distinct-Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks
    Maura Paterson, University of London
    Jul 26 (Mon), 1:30-2:30 pm, MC 5136
  • Record-Breaking Implementations of Elliptic Curve Scalar Multiplication on x86-64 Processors
    Patrick Longa, University of Waterloo
    Jul 16 (Fri), 11:30-12:30 pm, DC 1331
  • A Message Recognition Protocol Based on Standard Assumptions
    Atefeh Mashatan, EPFL
    Jul 14 (Wed), 2:30-3:30 pm, EIT 3141
  • Technology and Privacy: A Short Tour through an Emerging Landscape
    Tara Whalen, Office of the Privacy Commissioner of Canada
    Jul 12 (Monday), 1:30-2:30 pm, MC 5136
  • Constant-Size Commitments to Polynomials and Their Applications
    Greg Zaverucha, University of Waterloo
    Jul 8 (Thursday), 1:30-2:30 pm, DC 2314
  • Privacy-Preserving Interest Matching for Mobile Social Networking
    Qi Xie, University of Waterloo
    Jul 5 (Monday), 1:30-2:30 pm, DC 1331
June
  • An Improved Algorithm for Tor Circuit Scheduling
    Can Tang, University of Waterloo
    Jun 21 (Monday), 1:00-2:00 pm, DC 1331
  • Defending Against Client Compromises in Client-Server Applications
    Michael Reiter, University of North Carolina at Chapel Hill
    Jun 25 (Friday), 3:30-4:30 pm, MC 5136
May
  • Privacy & Stylometry: Exploring the Limitations and Potential of Automated Authorship Recognition
    Rachel Greenstadt, Drexel University
    May 7 (Friday), 1:30-2:30 pm, MC 5136
  • Tor and Censorship: Lessons Learned
    Roger Dingledine, The Tor Project
    May 11 (Tuesday), 1:30-2:30 pm, MC 5136
  • Client Puzzles and Denial-of-Service-Resistant Protocols
    Douglas Stebila, Queensland University of Technology
    May 13 (Thursday), 1:30-2:30 pm, DC 1331
  • Distributed Private-Key Generators for Identity-Based Cryptography
    Aniket Kate, University of Waterloo
    May 27 (Thursday), 1:30-2:30 pm, DC 1304
March
  • Designing a Privacy-Aware Location Proof Architecture
    Wanying Luo, University of Waterloo
    March 5 (Friday): 2:30-3:30 pm, DC 1304
  • Increasing Privacy with Self-destructing Data
    Tadayoshi Kohno, University of Washington
    March 9 (Tuesday): 4:30-5:30 pm, MC 5136B
  • Homomorphic Signatures for Network Coding
    Nina Zhang, University of Waterloo
    March 12 (Friday), 2:30-3:30 pm, TBA
  • Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
    Rosario Gennaro, IBM Research
    March 19 (Friday), 1:30-2:30 pm, TBA
February
  • The First Governmental Election with a Voter Verifiable Tally: Experiences using Scantegrity II at Takoma Park
    Jeremy Clark, University of Waterloo
    February 5 (Friday), 2:30-3:30 pm, DC 1304.
January
  • Using Sphinx to Improve Onion Routing Circuit Construction
    Aniket Kate, University of Waterloo
    January 14 (Thursday), 2:30-3:30 pm, DC 1331
  • Scalable Anonymous Overlay Networks
    Nick Hopper, University of Minnesota
    January 15 (Friday), 2:30-3:30 pm, MC 5136
  • Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift
    Alfred Menezes, University of Waterloo
    January 22 (Friday), 3:30-4:30 pm, MC 5158