December 21 | Joint RISC/Intercity Seminar to the occasion of Ronald Cramer's Oratie (inaugural lecture)- Ivan Damgård (Aarhus University, Denmark): The Past, Present and Future of Secure Multi-Party Computation
- Yuval Ishai (Technion and UCLA): Secure Multi-Party Computation in the Head
- Ronald Cramer (CWI, Amsterdam and Leiden university): Inaugural lecture (in the POORTGEBOUW)
|
October 29 | RISC Seminar- Adi Shamir (The Weizmann Institute of Science, Israel): Practical Cryptanalysis of Multi-Variate Schemes
|
October 19 | Joint RISC/Intercity Seminar on Computational Number-Theory in Connection with Cryptography- Ronald van Luijk (Simon Fraser University, Canada): Explicit twisting of Jacobians of dimension 2
- Alexander May (Bochum University, Germany): Using LLL-Reduction for Solving RSA and Factorization Problems: A survey
- David Freeman (Berkeley, CA, USA): Constructing abelian varieties for pairing-based cryptography
|
October 2 | Special RISC Seminar on Electronic Voting- Jeroen van de Graaf (CENAPAD MG/CO Brasil): Merging Pret-a-Voter and PunchScan
- Berry Schoenmakers (TU/e): Client/Server Trade-Offs in Universally Verifiable Elections
|
July 30 | RISC Seminar- Tomas Toft (Aarhus University): Trading sugar beet contracts using MPC
|
July 20 | RISC Seminar- Carles Padró (UPC Barcelona): On the Optimization of Secret Sharing Schemes for General Access Structures: New results from New Techniques
- Martijn Stam (EPFL): Building a Collision-Resistant Compression Function from Non-Compressing Primitives
- Krzysztof Pietrzak (CWI): Intrusion-Resilient Secret Sharing
- Eike Kiltz (CWI): Secure Hybrid Encryption from Weakened Key Encapsulation
|
July 9 | RISC Seminar- Yuval Ishai (Technion - Israel Institute of Technology): Zero-Knowledge from Secure Multiparty Computation
|
July 4 | RISC Seminar- Ueli Maurer (ETH Zurich, Switzerland): Domain Extension of Public Random Functions: Beyond the Birthday Barrier
|
July 3 | RISC Seminar- Ueli Maurer (ETH Zurich, Switzerland): Abstract Models of Computation and Complexity Lower Bounds
- Ronald de Wolf (CWI Amsterdam): Exponential Separations for One-way Quantum Communication Complexity, With Applications to Cryptography
- Serge Fehr (CWI Amsterdam): A New Technique for Randomness Extraction in the Presence of a Quantum Attacker
|
June 28 | RISC Seminar- David Cash (Georgia Institute of Technology, Atlanta): Non-Malleable Hash Functions
- Adam O'Neill (Georgia Institute of Technology, Atlanta): Deterministic and Efficiently Searchable Encryption
|
June 21-22 | Joint RISC/UCL Crypto Group Seminar- Francois Koeune, Ronald Cramer (UCL, CWI & Leiden University): Short Introduction to the groups
- Olivier Pereira (UCL): The use of techniques from distributed systems for the analysis of cryptographic protocols
- Francois-Xavier Standaert (UCL): The modelling of side-channel attacks
- Benoit Libert (UCL): Time capsule signatures in the standard model
- Serge Fehr (CWI): Quantum Cryptography and the Bounded-Quantum-Storage Model
- Robbert de Haan (CWI): Secure Computation from Random Error Correcting Codes
- Dennis Hofheinz (CWI): Security in the presence of key-dependent messages
|
April 23 | RISC Seminar- Krzysztof Pietrzak (CWI): Review of Some Recent Constructions of Extractors from Independent Sources
- Robbert de Haan (CWI): Secure Computation from Random Error Correcting Codes
- Serge Fehr (CWI): Secure Identification in the Bounded-Quantum-Storage Model
- Rune Thorbek (Aarhus University, Denmark, currently at CWI): Non-Interactive Proofs for Integer Multiplication
|
March 30 | Joint RISC/DIAMANT/Intercity Seminar- Peter Montgomery (Microsoft Research, Redmond): Parallel block Lanczos
- Ramarathnam Venkatesan (Microsoft Research, Redmond): Cryptographic applications involving spectral analysis of rapid mixing
- Corentin Pontreau (University of Caen): Bogomolov's problem, small points on varieties
- Sierk Rosema (Leiden): Sturmian substitutions, cutting paths and their projections
|
March 1 | RISC Seminar- Vinod Vaikuntanathan (MIT): Random Selection and Byzantine Agreement in the Full-Information Model
|
February 21-24 | TCC 2007: Fourth IACR Theory of Cryptography Conference |