RISC Seminars (Research on Information Security and Cryptology)
      Archives:  
[2025] 
 [2024] 
 [2023] 
 [2022] 
 [2021] 
 [2020] 
 [2019] 
 [2018] 
 [2017] 
 [2016] 
 [2015] 
 [2014] 
 [2013] 
 [2012] 
 [2011] 
 [2010] 
 [2009] 
 [2008] 
 [2007] 
 [2006] 
 [2005] 
 [2004] 
 [List of Speakers] 
(To receive information about upcoming seminars, 
register for the RISC mailing list.)
Past 2013 Event(s)
| December 13 | RISC Seminar Marco Tiloca (ICT SICS Stockholm):  SMACK: a security extension for the Constrained Application Protocol
 | 
| September 25 | RISC Seminar Erez Waisbard (Bar-Ilan University): Efficient Signature Scheme for Network Coding
 | 
| June 19 | Joint RISC/Combinatorics&Optimization Seminar Carles Padró (NTU Singapore, on leave from UPC Barcelona): Secret Sharing, Rank Inequalities and Information Inequalities
 | 
| June 7 | Joint RISC/Intercity Seminar Ten Chinburg (U Pennsylvania): Taking on new capacitiesJuan Garay (AT&T Labs -- Research): Resource-based Corruption in Secure ComputationIwan Duursma (U Illinois -- Urbana-Champaign): From abstract curves to efficient secret sharingChaoping Xing (Nanyang Technological University): On torsion limit of algebraic curves over finite fields
 | 
| May 13-25 | School and Workshop "Mathematics of Information-Theoretic Cryptography" Amos Beimel: Multi-Linear Secret Sharing SchemesOriol Farràs: Secret Sharing Schemes for Very Dense GraphsGilles Zemor: Low Rank Parity Check Codes and their Application to CryptographySuhas Digavvi: On Interactive Wireless Network SecurityHarald Niederreiter: Remarkable Sequences Obtained from Global Function FieldsYevgeniy Dodis: Key Derivation Without Entropy WasteRuud Pellikaan: Error-correcting pairs and arrays from algebraic geometry codesYvo Desmedt: Functional secret sharingTal Rabin: Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to FairnessAlexander May: Recent Progress in Decoding Random Linear CodesRenato Renner: Smooth entropy in physics and information theorySerge Fehr: The monogamy of entanglement, and one-sided device independent QKDFrantisek Matus: Ideal secret sharing in quantum settingJuan Garay: Broadcast-Efficient Secure Multiparty ComputationManoj Prabhakaran: Towards Quantitative Cryptographic ComplexityParikshit Gopalan: Locally Testable Codes and their GuisesHendrik Lenstra: Lattices with SymmetryIwan Duursma: Algebraic aspects of secret sharingChaoping Xing: List Decoding Reed-Solomon, Algebraic Geometry and Gabidulin SubcodesDiego Mirandola: On powers of codesMadhu Sudan: Locality in codes and LiftingHenning Stichtenoth: On Ihara's constant A(q) over non-prime finite fieldsAlp Bassa: Rational points on curves over finite fields and Drinfeld modular varietiesOlav Geil: Further improvements on the Feng-Rao bound for dual codesTarik Kaced: Essentially Conditional Inequalities Might HelpJesper Buus Nielsen: Fun with Oblivious Transfer
 | 
| March 20 | Special RISC seminar on cryptologic aspects of the spy-malware Flame Marc Stevens (CWI): Counter-cryptanalysis: analyzing FlameBrian LaMacchia, Dan Shumow (Microsoft): Fire Retardant for your PKI: Towards automatic detection of the next Flame-like attack
 | 
   
   0.1075s