Seminars

2016 Seminars

The CACR Seminar is being organized by Nik Unger, Alireza Sharifi and Kalikinkar Mandal.

December

  • Hack the Planet! From phone phreaking to subverting planetary infrastructures
    David Murakami Wood, Queen's University
    Dec 1 (Thu), 2:30 - 3:30 pm, MC 5501
  • Discovering cryptography with machine learning: Google's artificial enigma
    Nik Unger, University of Waterloo
    Dec 8 (Thu), 1:00 - 2:00 pm, DC 1304
November
  • A full RNS variant of FV like Somewhat Homomorphic Encryption Schemes
    Julien Eynard, University of Waterloo
    Nov 24 (Thu), 2:30 - 3:30 pm, EIT 3142
  • All-or-nothing Transforms: An Overview
    Nasr Esfahani, University of Waterloo
    Nov 28 (Mon), 2:00 - 3:00 pm, DC 1304
October
  • Social robots and security: What are the concerns?
    Brittany Postnikoff, University of Waterloo
    Oct 4 (Tue), 4:00 - 5:00 pm, DC 1304
  • Hacks and improvements for Tor's circuit-layer crypto
    Isis Agora Lovecruft, The Tor Project
    Oct 13 (Thu), 2:30 pm - 3:30 pm, DC 1304
  • Efficiently finding short generators in multiquadratic fields
    Henry de Valence, TU Eindhoven
    Oct 14 (Fri), 11:00 am - 12:00 pm, DC 1304
September
  • Groebner bases and polynomial systems from cryptography
    Shuhong Gao, Clemson University
    Sep 1 (Thu), 11:00 - 12:00 pm, DC 1304
  • What hello Barbie can tell us about behavioural targeting
    Valerie Steeves, University of Ottawa
    Sep 15 (Thu), 2:30 - 3:30 pm, DC 1302
August
  • From isomorphism-based security for graphs to semantics-preserving security for the resource description framework
    Zhiyuan Lin, University of Waterloo
    Aug 4 (Thu), 11:00 - 12:00 pm, EIT 3145
July
  • Password expiration policies: quantifying assumed security benefits
    Paul van Oorschot, Carleton University
    Jul 7 (Thu), 10:30 - 11:30 am, M3 3127
  • Security analysis of Brazilian voting machines
    Diego Aranha, University of Campinas
    Jul 21 (Thu), 2:00 - 3:00 pm, MC 6486
  • Automated safety analysis of administrative temporal role-based access control (ATRBAC) policies using Mohawk+T
    Jonathan Mohamed Shahen, University of Waterloo
    Jul 26 (Tue), 1:00 - 2:00 pm, EIT 3141
June
  • Evaluating re-authentication strategies for smartphones
    Lalit Agarwal, University of Waterloo
    Jun 1 (Wed), 10:30 - 11:30 am, DC 2310
  • Targeted mimicry attacks on touch input implicit authentication
    Hassan Khan, University of Waterloo
    Jun 2 (Thu), 10:00 - 11:00 am, DC 2314
  • Defeating censorship with perfectly imitated decoy pages
    Cecylia Bocovich, University of Waterloo
    Jun 9 (Thu), 10:30 - 11:30 am, DC 2585
  • Towards practical lattice-based signature schemes
    Nina Bindel, Technical University of Darmstadt
    Jun 17 (Fri), 11:00 am - 12:00 pm, QNC 1201
  • One-time signatures from generalized discrete logarithms
    David Jao, University of Waterloo
    Jun 24 (Fri), 3:30 pm - 4:30 pm, MC 5501
May
  • Constraining pseudorandom functions privately
    David Wu, Stanford University
    May 10 (Tue), 2:00 - 3:00 pm, DC 2585
  • Quantum technologies for cyber security: from threats to solutions
    Bruno Huttner, IDQuantique
    May 12 (Thu), 1:00 - 2:00 pm, QNC 1201
April
  • PET Sematary: Privacy's return from the dead and the rise of Privacy Engineering
    Seda Gürses, Princeton University
    Apr 1 (Fri), 2:30 pm - 3:30 pm, DC 1304
  • Toward size overhead reduction of post-quantum multivariate quadratic and hash-based digital signatures
    Geovandro Pereira, University of Waterloo
    Apr 12 (Tue), 10:00 am - 11:00 am, QNC 4104
  • Explicit arithmetic on Abelian varieties
    Kumar Murty, University of Toronto
    Apr 25 (Mon), 2:30 pm - 3:30 pm, MC 6486
March
  • Matching theory and anonymity
    Eva Infeld, Dartmouth College
    Mar 11 (Fri), 2:00 pm - 3:00 pm, MC 5501
February
  • Grassroots surveillance resistance at your local library
    Alison Macrina, Library Freedom Project
    Feb 2 (Tue), 1:30 pm - 2:30 pm, DC 1304
  • Post-quantum security of authenticated key exchange
    Jason LeGrow, University of Waterloo
    Feb 9 (Tue), 10:00 am - 11:00 am, QNC 4104
  • Battling internet censorship and surveillance
    Ian Goldberg, University of Waterloo
    Feb 18 (Thu), 12:00 pm - 1:00 pm, DC 1302
  • The secret life of mobile applications
    Julia Rubin, MIT
    Feb 29 (Mon), 10:30 am - 11:30 am, DC 1304
January
  • Optimization and hardware implementations for composited de Bruijn sequence generators
    Bo Yang, University of Waterloo
    Jan 14 (Thu), 11:30 am - 12:30 pm, EIT 3145
  • Shadow: Scalable simulation for systems security research
    Rob Jansen, Naval Research Laboratory
    Jan 20 (Wed), 3:30 pm - 4:30 pm, DC 1304
  • Usability and security perceptions of implicit authentication
    Hassan Khan, University of Waterloo
    Jan 25 (Mon), 2:30 pm - 3:30 pm, DC 2310