2014 Seminars

The Cryptography Seminar is being organized by Jalaj Upadhyay, Alireza Sharifi, Kalikinkar Mandal and Brandon Weir.


  • Secret-Key Generation and Secure Communication at the Physical Layer in Wireless Systems
    Ashish Khisti, University of Toronto
    Dec 3 (Wed), 9:30 am-10:30 am, EIT 3142
  • Juggling With Points on an Elliptic Curve
    Gabriel Gauthier-Shalom, University of Waterloo
    Nov 25 (Fri), 3:30 pm-4:30 pm, MC 5136B
  • Engineering Event Evidencing for Legal Documents Using Cryptography Framework, Algorithms and Standards
    Leon Pintsov, SignitSure Inc.
    Nov 19 (Wed), 12:00 pm-1:00 pm, QNC 1201
  • Exploring the Asymptotic Bounds on the Trade-off Between Query Anonymity and Communication Cost in Wireless Sensor Networks
    Alireza Mortezaei, University of Waterloo
    Nov 10 (Mon), 10:00 am-11:00 am, EIT 3142
  • Isogeny-based Quantum-Resistant Undeniable Signatures
    Vladimir Soukharev, University of Waterloo
    Nov 7 (Fri), 1:30 pm-2:30 pm, DC 1304
  • Muddler: Using Oblivious RAM For A Privacy Preserving Location-Based Service
    Danish Mehmood, University of Waterloo
    Oct 14 (Tue), 2:30 pm-3:30 pm, DC 2310
  • The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid
    Mark Stephen Dittmer, University of Waterloo
    Oct 28 (Tue), 11:00 am-12:00 pm, E5 4007
  • Provable Security of Advanced Properties of TLS and SSH
    Douglas Stebila, Queensland University of Technology
    Sep 22 (Mon), 1:00 pm-2:00 pm, DC 1304
  • Large-Scale Emulation of Anonymous Communication Networks
    Sukhbir Singh, University of Waterloo
    Aug 1 (Tue), 1:30 pm-2:30 pm, DC 1331
  • New Adversary Models for Censorship Circumvention Schemes
    Nicholas Hopper, University of Minnesota
    Aug 5 (Tue), 3:00 pm-4:00 pm, DC 2585
  • Censorship Games
    Tariq Elahi, University of Waterloo
    Aug 13 (Wed), 1:30 pm-2:30 pm, DC 2585
  • Resilient Aggregation Techniques for Linear and Tree-Based Wireless Sensor Networks
    Kevin Henry, University of Waterloo
    Jul 2 (Wed) 2:30 pm-3:30 pm, DC 2310
  • Stuck on the Agenda: Lesson Drawing from "Lawful Access" Issues in Canada
    Christopher Parsons, University of Toronto
    Jul 4 (Fri), 2:00 pm-3:30 pm, DC 1304
  • Recent Advances in Algorithms for the Discrete Logarithm Problem
    Alfred Menezes, University of Waterloo
    Jul 4 (Fri), 3:30 pm-4:30 pm, M3 3103
  • Quantum Position Verification
    Dominique Unruh, University of Tartu
    Jul 7 (Mon), 2:30 pm-3:30 pm, QNC 0101
  • Storing 56-Bit Keys in Human Memory
    Joseph Bonneau, Center for Information Technology Policy
    Jul 25 (Fri), 2:00 pm-3:00 pm, DC 1304
  • The Best of Both Worlds: Combining Information-Theoretic and Computational Private Information Retrieval for Communication
    Casey Devet, University of Waterloo
    Jul 31 (Thu), 2:30 pm-3:30 pm, DC 1331
  • Using Static Analysis and Machine Learning to Improve the Security and Configuration Management of Systems
    David Lie, University of Toronto
    Jun 11 (Wed), 11:00 am-12:00 pm, EIT 3151-3153
  • Modern Secure Data Management
    Radu Sion, Stony Brook University
    Jun 18 (Wed), 2:30 pm-3:30 pm, DC 1302
  • Effective Attacks and Provable Defenses for Website Fingerprinting
    Tao Wang, University of Waterloo
    May 12 (Mon), 10:30 am-11:30 am, DC 2310
  • Designing, Implementing and Validating Random Bit Generators
    Jithra Adikari and Farhad Haghighizadeh, Elliptic Technologies Inc.
    Apr 11 (Fri), 11:00 am-12:00 pm, E5 5106-5128
  • Policy Enforcement on Unstructured Information via Machine Learning
    Atif Khan, University of Waterloo
    Apr 16 (Wed), 11:00 am-12:00 pm, DC 2585
  • Privacy Preserving User Data Collection in Anonymity Networks
    Tariq Elahi, University of Waterloo
    Apr 16 (Wed), 2:15-3:15 pm, DC 2310
  • The LiveLabs Urban LifeStyle Innovation Platform : Opportunities, Challenges, and Current Results
    Rajesh Krishna Balan, Singapore Management University
    Apr 24 (Thu), 2:30-3:15 pm, DC 1304
  • Beyond Bitcoin 1.0: The Second Wave of Cryptocurrency, Challenges and Opportunities
    Vitalik Buterin, Ethereum
    Mar 18 (Tue), 3:00-4:00 pm, DC 2585
  • Flexible Combinatiorial Key Pre-Distribution for Wireless Sensor Networks
    Kevin Henry, University of Waterloo
    Mar 20 (Thu), 4:00-5:00 pm, DC 1331
  • A Guide to Exporting Quantum Cryptography from Canada
    Steve Whitney, BlackBerry
    Mar 24 (Mon), 1:00-2:00 pm, QNC TBD
  • A User-Friendly Toolkit for Constructing Practical Format-Abiding Encryption Schemes
    Kevin Dyer, Portland State University
    Mar 27 (Thu), 3:00-4:00 pm, DC 2585
  • On the Computational Complexity of a Circuit Obfuscation Problem
    Mohamed El Massad, University of Waterloo
    Feb 3 (Mon), 2:30 - 3:30 pm, EIT 3142
  • Nonlinear Mappings and Sequence Design for Good Correlation
    Jin-Ho Chung, UNIST (Korea)
    Feb 18 (Tue), 2:30 - 3:30 pm, E5 5106/5128
  • Algorithms for Gaussian Normal Bases Multipliers
    David Jao, University of Waterloo
    Feb 28 (Fri), 3:30 - 4:30 pm, MC 5158
  • Post-Quantum Cryptography: Multivariate Public Key Cryptosystems
    Jintai Ding, University of Connecticut
    Jan 14 (Tue), 2:30 - 3:30 pm, MC 5158
  • Website Fingerprinting Attacks and Defenses
    Rob Johnson, Stony Brook University
    Jan 31 (Fri), 2:30 - 3:30 pm, DC 1304