RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)

Past 2011 Event(s)


December 1-2Workshop on Computational Number Theory to the occasion of Herman te Riele's retirement
  • Paul Leyland: A History of Factoring in the Real World
  • Peter Montgomery: Early History of the Number Field Sieve
  • Joppe Bos: Recent Developments in ECM
  • Jason Papadopoulos: High-performance optimization of GNFS polynomials
  • Thorsten Kleinjung: Filtering and the matrix step in NFS
  • Alexander Kruppa: Comparison of the Block Wiedemann with the Block Lanczos algorithm for the linear algebra step in NFS
  • Joost Batenburg: Discrete tomography for lattice images: a journey through Mathematics
  • Rob Tijdeman: Smooth numbers
  • Pieter Moree: The ErdÅ‘s-Moser conjecture
  • Pieter Moree: Euler-Kronecker constants: from Ramanujan to Ihara
  • Andrew Odlyzko: Computation and the Riemann Hypothesis
November 25RISC Seminar
  • Venkat Guruswami (Carnegie Mellon University): Bridging Shannon and Hamming: Codes for computationally simple channels
November 11Special RISC Seminar on Extractors and Privacy Amplification
  • Ariel Gabizon (Technion, currently visiting CWI): Extractors: Background, Applications and Recent Constructions
  • Gil Cohen (Weizmann Institute): Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification
  • Stefan Dziembowski (Warsaw University & University of Rome La Sapienzia): Leakage-Resilient Cryptography From the Inner-Product Extractor
  • Christian Schaffner (University of Amsterdam, CWI): Randomness extraction and expansion in the quantum world
October 6RISC Seminar
  • Yael Tauman Kalai (Microsoft Research): Cryptography Resilient to Physical Attacks
May 21-24The 5th International Conference on Information Theoretic Security
    January 26RISC Seminar
    • Daniel Wichs (NYU): Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions
    • Elette Boyle (MIT): Fully Leakage-Resilient Signatures
    • Krzysztof Pietrzak (CWI): Subspace LWE & Applications
    0.00979s c