Oberseminar über Kryptographie
150 909 - (MSc Modul5: Modul 5 )
Dozent | Zeit | Raum |
---|---|---|
Prof. A. May | donnerstags, 16.00-18.00 | NA 5/64 |
Themen
Es werden aktuelle Paper bevorstehender Konferenzen sowie eigene Ergebnisse vorgestellt und diskutiert. Jeder ist herzlich eingeladen.
Datum | Votragende/r | Thema |
---|---|---|
09.02.2012 | Alexander May | Index Calculus for Elliptic Curves over F_q^n |
01.03.2012 | Michael Dollichon | Algebraische Kryptanalyse der Blockchiffre LED (Bachelorarbeit) |
15.03.2012 | Saqib A. Kakvi | Certifying RSA Note: Talk is at 14:00 |
22.03.2012 | Gottfried Herold | Homomorphic Signatures from Codes |
05.04.2012 | Immo Wehrenberg | Fully Homomorphic Encryption (Diplomarbeit) |
13.04.2012 | Eric Reich | Ring-LWE (Diplomarbeit) |
27.04.2012 | Wladimir Paulsen | Efficient implementation of lattice based signature scheme. |
03.05.2012 | Enrico Thomae | Solving Underdetermined Systems of Multivariate Quadratic Equations revisited |
15.05.2012 | Gottfried Herold | Polly Cracker, revisited, revisited |
24.05.2012 | Merlin Schüler | Abschlussarbeit |
05.06.2012 | Daniel Masny | Identitätsbasierte Verfahren auf Gitter-Grundlage mit scharfem Sicherheitsbeweis |
14.06.2012 | Saqib Kakvi | Breaking RSA generically is as hard as factoring |
28.06.2012 | Jorge Villar | Optimal Reductions of Some Decisional Problems to the Rank Problem" |
05.07.2012 | Marina Efimenko | How to Encipher Messages on a Small Domain: Deterministic Encryption and the Thorp Shuffle. |
12.07.2012 | Carla Rafols Salvador | A New Pseudorandom Generator from Collision-Resistant Hash Functions |
19.07.2012 | Ilya Ozerov | A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU |
27.07.2012 | Alexander Meurer | Cryptanalysis of the Niederreiter PKC over generalized Reed-Solomon codes |
03.08.2012 | Gottfried Herold | Integer Programming with a fixed number of variables |
31.08.2012 | Gottfried Herold | New Attacks for Knapsack-Based Cryptosystems |
06.09.2012 | Krzysztof Pietrzak | A Counterexample to the Chain Rule for HILL entropy (and what Deniable Encryption has to do with it) |
14.09.2012 | Jonas Pütz | Dissection Attacks |
27.09.2012 | Frank Quedenfeld | The FGLM algorithm - fast conversion of Gröbner bases |
28.09.2012 | Sven Schäge | The Security of TLS-DHE in the Standard Model |