RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)

Past 2010 Event(s)


November 18-19Joint RISC/Intercity Seminar on Crypto, Coding and Geometry
  • Peter Beelen (DTU, Copenhagen): Obtaining information about explicit towers using their modular interpretation
  • Ruud Pellikaan (TU/e): Attacking public-key cryptosystems using algebraic-geometric codes
  • Jordi Pujolàs (Universitat de Lleida, Lleida): Explicit 2-Sylow subgroups of Jacobians of genus 2 curves over finite fields
  • Ronald Cramer (CWI & Leiden University): New Bounds on Arithmetic Secret Sharing from Algebraic Function Fields
  • Carles Padró (NTU, Singapore): Constructing Ideal Secret Sharing Schemes For Useful Access Structures
  • Arnaldo Garcia (IMPA, Rio de Janeiro): On recursive towers over finite fields
  • Henning Stichtenoth (Sabanci University, Istanbul): Some Applications of Towers of Curves in Coding Theory
  • Ignacio Cascudo (CWI): The Torsion Limit for Algebraic Function Fields and Applications in Cryptography and Complexity
  • Simeon Ball (UPC, Barcelona): On subsets of a finite vector space in which every subset of basis size is a basis
July 15RISC Seminar
  • Mihir Bellare (UC San Diego): Pseudorandom Functions and Permutations Secure Against Related-Key Attack
  • Michel Abdalla (ENS Paris): Smooth Projective Hashing: Generalizations and Applications
  • David Cash (US San Diego): Cryptographic Agility and its Relation to Circular Encryption
May 10RISC Seminar
  • Igor Shparlinski (Macquarie University): Sum-Product Problem: New Generalisations and Applications
May 6-7Workshop Public Key Cryptography and the Geometry of Numbers
  • Hendrik Lenstra (Universiteit Leiden): Introduction to Lattices and the LLL Algorithm
  • Oded Regev (Tel-Aviv University, Israel): The Complexity of Lattice Problems
  • Chris Peikert (Georgia Institute of Technology, USA): From Worst-Case, to Average-Case, to Cryptography
  • Eike Kiltz (CWI): Lattice-based Cryptography: Advanced Protocols
  • Chris Peikert (Georgia Institute of Technology, USA): The Peculiar Properties of Lattice-Based Encryption
  • Oded Regev (Tel-Aviv University, Israel): On Ideal Lattices and Learning with Errors Over Rings
  • Nigel Smart (University of Bristol, UK): Efficient Fully Homomorphic Encryption Without Lattices (Almost2)
  • Erwin Torreao Dassen (Universiteit Leiden): Using Layered Lattices
May 4RISC Seminar
  • Ron Rivest (MIT): The Security of Voting Systems
March 26Special RISC Seminar on Combinatorics in Secret Sharing
  • Carles Padró (UPC Barcelona & CWI): Ideal Multipartite Secret Sharing: New Developments and Open Problems
  • Relinde Jurrius (TU/e): Subcode Supports in Matroid Theory
  • Laszlo Csirmaz (Renyi Institute and CEU, Hungary): Secret sharing on Infinite Structures
February 15-19Workshop Provable Security against Physical Attacks
  • Elisabeth Oswald: Introduction to Side-Channel Analysis
  • Nadia Heninger: Recovering cryptographic keys with the cold boot attack
  • Olivier Pereira: Leakage Resilient Cryptography in Practice
  • Yuval Ishai: Private Circuits
  • Yevgeniy Dodis: Leakage Resilience and the Bounded Retrieval Model
  • Stefan Dziembowski: On the "only computation leaks information" paradigm
  • Shafi Goldwasser: t.b.a.
  • Helena Handschuh: Practical aspects of physical security, implementation attacks and counter-measures
  • Christof Paar: Application of Physical Attacks to Real World Devices
  • Stefan Mangard: Advanced Topics in Side-Channel Attacks
  • Christophe Giraud: Practical Difficulties of Physical Attacks
  • Gil Segev: Public-key Cryptosystems Resilient to Key Leakage
  • Daniel Wichs: Non-Malleable Codes and Applications to Tamper-Resilient Security
  • Ingrid Verbauwhede: Design methods and tools for side-channel secure circuits
  • Sergei Skorobogatov: Hardware security of silicon chips: progress, pitfalls and challenges for physical attacks
  • David Naccache: Hamster wheel keys
  • Sebastian Faust: Leakage-Resilient Signatures
  • Krzysztof Pietrzak: Leakage-Resilient PRFs/PRPs and Public-Key Encryption
  • Kerstin Lemke-Rust: On Security Evaluation Testing
January 20Special RISC Seminar on Computational Number Theory
  • Paul Zimmermann (INRIA Nancy): An O(M(n) log n) algorithm for the Jacobi symbol
  • Peter Montgomery (Microsoft and CWI): Adapting Block Lanczos to the Huygens supercomputer
0.05164s