RISC Seminars (Research on Information Security and Cryptology)
Archives:
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
[List of Speakers]
(To receive information about upcoming seminars,
register for the RISC mailing list.)
Past 2008 Event(s)
October 21 | Joint RISC/DIAMANT Seminar on Algebraic Function Fields and Their Cryptographic Applications- Ignacio Cascudo (U. de Oviedo): Reducing the difference between the thresholds in AG-based secret sharing schemes
- Oriol Farràs (UPC Barcelona): On the access structure of Algebraic Geometric Schemes
- Ruud Pellikaan (TU/e): Efficient construction of algebraic geometry codes; the q-th power algorithm
- Alp Bassa (EPFL Lausanne): A new tower over cubic finite fields
|
October 9 | Special RISC Seminar on Quantum Information Theory- Serge Fehr (CWI): High-Order Entropic Uncertainty Relations
- David Pérez García (Universidad Complutense de Madrid): Unbounded Violation of Tripartite Bell Inequalities
- Richard D. Gill (Leiden University): Polish poker and the Bell inequality
- Christian Schaffner (CWI): The Operational Meaning of Min- and Max-entropy
|
October 2 | Special RISC seminar on Cryptography Applied- Ivan Damgård (Aarhus): Multi-Party Computation Goes Live
- Tomas Toft (CWI & TU/e): Solving linear programming problems using MPC -- theory vs practice
- Jan Camenisch (IBM Zurich): Crypto in Practice: Private Authentication
- Ivan Damgård (Aarhus): Theory and Practice of Personal Digital Signatures
|
September 22-26 | International School on Mathematical Cryptology and Research Seminar on Cryptology and Coding Theory |
August 19 | RISC Seminar- Omer Reingold (Weizmann Institute): Pseudorandom Walks: Looking Random in the Long Run or All the Way
|
July 16 | Mini-symposium in 5th European Congress of Mathematics (ECM) on Mathematics of Cryptology- Oded Goldreich (Weizmann Institute, Israel): The Bright Side of Hardness
- Steven Galbraith (Royal Holloway, University of London): Elliptic curves, pairings and public key cryptography
- Renato Renner (ETH Zürich, Switzerland): Induction and quantum cryptography
- Eyal Kushilevitz (Technion, Israel): The Private Information Retrieval Problem
|
June 2 - 6 | Workshop Hash Functions in Cryptology: Theory and Practice- Xiaoyun Wang: Survey of recent research on hash functions
- Florian Mendel: Cryptanalysis of GOST
- Stefano Tessaro: Domain Extension of Public Random Functions
- Christophe Petit: Cryptographic hash functions from expander graphs: State of the art
- Marc Fischlin: Perfectly Crafted Swiss Army Knives - in Theory
- Krzysztof Pietrzak: On the Generic Insecurity of the Full Domain Hash
- Eike Kiltz: Programmable Hash Functions and Their Applications
- Orr Dunkelman: Re-visiting HAIFA (and why you should visit too)
- Thomas Peyrin: Security Analysis of Generalized Sponge Functions
- Anja Lehmann: Robust Multi-Property Combiners for Hash Functions
- Thomas Ristenpart: Design Paradigms for Building Multi-Property Hash Functions
- Martijn Stam: Efficient collision-resistant hashing from public random functions
- Dan Bernstein: How fast are hash functions?
- Bart Preneel: Hash functions based on block ciphers and modular arithmetic
- Markku-Juhani O. Saarinen: Boxer - A Hash Function
- Jean-Philippe Aumasson: Preimages of HAVAL and MD5
- Christian Rechberger: Preimages of SHA-0 and SHA-1
- John Kelsey: How to choose SHA-3
- Stefan Lucks: Is there a model for hash functions without structural flaws?
- Elena Andreeva: A new multi-property-preserving iterative hash function
|
May 28 | Special RISC seminar on Interactions Between Cryptography and Formal Methods- Bogdan Warinschi (Bristol University, UK): An Introduction to Computational Soundness
- Dominique Unruh (Saarland University, Germany): Computational Soundness of Zero-Knowledge Proofs
- Dennis Hofheinz (CWI): Security in the Presence of Key-Dependent Messages
- Peter van Rossum (University of Nijmegen): TBA
|
0.05781s