RISC Seminars (Research on Information Security and Cryptology)
Archives:
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
[List of Speakers]
(To receive information about upcoming seminars,
register for the RISC mailing list.)
Past 2010 Event(s)
November 18-19 | Joint RISC/Intercity Seminar on Crypto, Coding and Geometry- Peter Beelen (DTU, Copenhagen): Obtaining information about explicit towers using their modular interpretation
- Ruud Pellikaan (TU/e): Attacking public-key cryptosystems using algebraic-geometric codes
- Jordi Pujolàs (Universitat de Lleida, Lleida): Explicit 2-Sylow subgroups of Jacobians of genus 2 curves over finite fields
- Ronald Cramer (CWI & Leiden University): New Bounds on Arithmetic Secret Sharing from Algebraic Function Fields
- Carles Padró (NTU, Singapore): Constructing Ideal Secret Sharing Schemes For Useful Access Structures
- Arnaldo Garcia (IMPA, Rio de Janeiro): On recursive towers over finite fields
- Henning Stichtenoth (Sabanci University, Istanbul): Some Applications of Towers of Curves in Coding Theory
- Ignacio Cascudo (CWI): The Torsion Limit for Algebraic Function Fields and Applications in Cryptography and Complexity
- Simeon Ball (UPC, Barcelona): On subsets of a finite vector space in which every subset of basis size is a basis
|
July 15 | RISC Seminar- Mihir Bellare (UC San Diego): Pseudorandom Functions and Permutations Secure Against Related-Key Attack
- Michel Abdalla (ENS Paris): Smooth Projective Hashing: Generalizations and Applications
- David Cash (US San Diego): Cryptographic Agility and its Relation to Circular Encryption
|
May 10 | RISC Seminar- Igor Shparlinski (Macquarie University): Sum-Product Problem: New Generalisations and Applications
|
May 6-7 | Workshop Public Key Cryptography and the Geometry of Numbers- Hendrik Lenstra (Universiteit Leiden): Introduction to Lattices and the LLL Algorithm
- Oded Regev (Tel-Aviv University, Israel): The Complexity of Lattice Problems
- Chris Peikert (Georgia Institute of Technology, USA): From Worst-Case, to Average-Case, to Cryptography
- Eike Kiltz (CWI): Lattice-based Cryptography: Advanced Protocols
- Chris Peikert (Georgia Institute of Technology, USA): The Peculiar Properties of Lattice-Based Encryption
- Oded Regev (Tel-Aviv University, Israel): On Ideal Lattices and Learning with Errors Over Rings
- Nigel Smart (University of Bristol, UK): Efficient Fully Homomorphic Encryption Without Lattices (Almost2)
- Erwin Torreao Dassen (Universiteit Leiden): Using Layered Lattices
|
May 4 | RISC Seminar- Ron Rivest (MIT): The Security of Voting Systems
|
March 26 | Special RISC Seminar on Combinatorics in Secret Sharing- Carles Padró (UPC Barcelona & CWI): Ideal Multipartite Secret Sharing: New Developments and Open Problems
- Relinde Jurrius (TU/e): Subcode Supports in Matroid Theory
- Laszlo Csirmaz (Renyi Institute and CEU, Hungary): Secret sharing on Infinite Structures
|
February 15-19 | Workshop Provable Security against Physical Attacks- Elisabeth Oswald: Introduction to Side-Channel Analysis
- Nadia Heninger: Recovering cryptographic keys with the cold boot attack
- Olivier Pereira: Leakage Resilient Cryptography in Practice
- Yuval Ishai: Private Circuits
- Yevgeniy Dodis: Leakage Resilience and the Bounded Retrieval Model
- Stefan Dziembowski: On the "only computation leaks information" paradigm
- Shafi Goldwasser: t.b.a.
- Helena Handschuh: Practical aspects of physical security, implementation attacks and counter-measures
- Christof Paar: Application of Physical Attacks to Real World Devices
- Stefan Mangard: Advanced Topics in Side-Channel Attacks
- Christophe Giraud: Practical Difficulties of Physical Attacks
- Gil Segev: Public-key Cryptosystems Resilient to Key Leakage
- Daniel Wichs: Non-Malleable Codes and Applications to Tamper-Resilient Security
- Ingrid Verbauwhede: Design methods and tools for side-channel secure circuits
- Sergei Skorobogatov: Hardware security of silicon chips: progress, pitfalls and challenges for physical attacks
- David Naccache: Hamster wheel keys
- Sebastian Faust: Leakage-Resilient Signatures
- Krzysztof Pietrzak: Leakage-Resilient PRFs/PRPs and Public-Key Encryption
- Kerstin Lemke-Rust: On Security Evaluation Testing
|
January 20 | Special RISC Seminar on Computational Number Theory- Paul Zimmermann (INRIA Nancy): An O(M(n) log n) algorithm for the Jacobi symbol
- Peter Montgomery (Microsoft and CWI): Adapting Block Lanczos to the Huygens supercomputer
|
0.05218s