| 18-12-2020 | Student Seminar- Matthieu Lequesne (CWI): On the security of subspace subcodes of Reed-Solomon codes for public key encryption
|
| 11-12-2020 | Student Seminar- Jana Sotáková (CWI & QSC): Computing Isogenies
|
| 04-12-2020 | Student Seminar |
| 27-11-2020 | Student Seminar- Mark Abspoel (CWI): Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over ℤ/p^k ℤ
|
| 06-11-2020 | Student Seminar- Chen Yuan (CWI): Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries
|
| 30-10-2020 | Student Seminar- Aron van Baarsen (CWI): VDFs in Class Groups and the Strong Algebraic Group Model
|
| 23-10-2020 | Student Seminar- Esteban Landerreche (CWI): Time-Aware Cryptography in UC
|
| 09-10-2020 | Student Seminar- João Duarte: On the Complexity of the Crossbred Algorithm
|
| 25-09-2020 | Student Seminar- Michael Klooss (KIT): Efficient zero-knowledge arguments in the DLog setting
|
| 11-09-2020 | Student seminar- Nicolas Resch (CWI): Thresholds for Random Linear Codes.
|
| 31-07-2020 | Student Seminar- David Butler (The Alan Turing Institute): Machine-checked proofs of security are important to increase the rigour of provable security.
|
| 24-07-2020 | Student Seminar- Sasha Lapiha (CWI): Comparing Lattice Families for Bounded Distance Decoding near Minkowski’s Bound.
|
| 17-07-2020 | Student Seminar- Lisa Kohl: MPC with Silent Preprocessing via Pseudorandom Correlation Generators
|
| 10-07-2020 | Student Seminar- André Schrottenloher (Inria Paris): Quantum tools for symmetric cryptanalysis
|
| 03-07-2020 | Student Seminar- Wessel van Woerden (CWI): How to break SVP challenges
|
| 12-06-2020 | Student Seminar- Jana Sotáková (QuSoft & UvA): The Decisional Diffie-Hellman problem for class group actions
|
| 05-06-2020 | Student Seminar- Ronald Cramer (CWI): Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes
|
| 29-05-2020 | Student Seminar- Mark Abspoel (CWI): Regenerating codes over Galois rings and applications to MPC
|
| 08-05-2020 | Student Seminar- Koen de Boer (CWI): Sampling relatively factorizable elements in ideals of number fields
|
| 01-05-2020 | Student Seminar- Serge Fehr (CWI & Universiteit Leiden): The compressed quantum random oracle technique
|
| 28-04-2020 | Student Seminar- Toon Segers (Eindhoven Technical University): Verifiable MPC using Compressed Sigma-protocols
|
| 24-04-2020 | Student Seminar- Thomas Attema (TNO & CWI): Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
|
| 21-04-2020 | Student Seminar- Marten van Dijk (CWI & University of Connecticut): Towards Secure Computing Environments pt 2
|
| 14-04-2020 | Student Seminar- Thijs Veugen (TNO & CWI): An Implementation of the Paillier Crypto System with Threshold Decryption without a Trusted Dealer
|
| 07-04-2020 | Student Seminar- Chen Yuan (CWI): Beating the Probabilistic Lower Bound on Perfect Hashing
|
| 03-04-2020 | Student Seminar- Riddhi Ghosal (Indian Statistical Institute): Approximate Distance-Comparison-Preserving Encryption
|
| 31-03-2020 | Student Seminar- Jelle Don (CWI): The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
|
| 27-03-2020 | Student Seminar- Marten van Dijk (CWI & University of Connecticut): Towards Secure Computing Environments
|
| 24-03-2020 | Student Seminar- Leo Ducas (CWI): Random Self-reducibility of Ideal-SVP via Arakelov Random Walks
|
| 07-02-2020 | Student Seminar- Wessel van Woerden (CWI & Universiteit Leiden): Lattice Packings: an upper bound on the number of perfect lattices.
|
| 31-01-2020 | Student Seminar- Esteban Landerreche (CWI): Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions
|
| 24-01-2020 | Student Seminar- Alexander Krigsman (Universiteit Leiden): Efficient Computation of the Deuring Correspondence
|
| 10-01-2020 | Student Seminar- Annamaria Iezzi (University of South Florida): A quantum attack to the isogeny problem in the "commutative case".
- Chloe Martindale (University of Bristol): How to not break SIDH.
- Laia Amoros (Aalto University): The use of lattices in wireless communications in a wiretap setting.
|