Seminar 2012

Jan

Erasure Codes for Heterogeneous Networked Storage Systems
Dr Lluis PAMIES-JUAREZ, Nanyang Technological University, Singapore
25.01.2012, 11am, SPMS-MAS-05-36
Attached: Slides

Feb

Hashing into Elliptic Curves
Dr Reza Rezaeian FARASHAHI, Macquarie University, Australia
01.02.2012, 11am, SPMS-MAS-05-36

Multi-Exponentiation Algorithms
Dr CHEN Chien-Ning, Nanyang Technological University, Singapore
15.02.2012, 11am, SPMS-MAS-05-36
Attached: Slides

How to build a secure communication channel
Dr YANG Guomin, Temasek Laboratories, NUS, Singapore
22.02.2012, 11am, SPMS-MAS-05-36
Attached: Slides

Mar

Construction of bent functions based on Z-bent functions
Prof Sugata GANGOPADHYAY, Indian Statistical Institute, Chennai Centre, India
21.03.2012, 11am, SPMS-MAS-05-36
Attached: Slides

Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis
Dr LU Jiqiang, I2R, A*STAR, Singapore
28.03.2012, 11am, SPMS-MAS-05-36
Attached: Slides

Apr

Stark Units and the Point Counting Problem
Prof HUANG Ming-Deh, University of Southern California, California, USA
04.04.2012, 11am, SPMS-MAS-05-36

Extending Brickell-Davenport Theorem to non-Perfect Secret Sharing Schemes
Dr Oriol FARRAS, Universitat Rovira i Virgili, Spain
18.04.2012, 11am, SPMS-MAS-05-36
Attached: Slides

Live mobile device forensics
Dr Vrizlynn THING, I2R, A*STAR, Singapore
25.04.2012, 11am, SPMS-MAS-05-36

May

Shorter IBE and Signatures via Asymmetric Pairings
CHEN Jie, Nanyang Technological University, Singapore
02.05.2012, 11am, SPMS-MAS-05-36

Jun

Side-Channel Attacks: An Overview of Suitable Methods
Annelie HEUSER, Technische Universität Darmstadt, Germany
04.06.2012, 2pm, SPMS-MAS-05-36

Constructive Side-Channel Analysis: A Useful Tool for Secure Circuit Design
Marc STOTTINGER, Technische Universität Darmstadt, Germany
04.06.2012, 2.30pm, SPMS-MAS-05-36
Attached: Slides

Identity-Based Encryption Resilient to Continual Auxiliary Leakage
Dr Sherman CHOW, University of Waterloo, Canada
26.06.2012, 11am, SPMS-MAS-05-36

Group Signature Scheme and Biometric Identity Management
Dr Hervé CHABANNE, Morpho
29.06.2012, 2pm, SPMS-MAS-05-36

Jul

Polar Codes: From Theory To Practice
Prof Alexander VARDY, University of California, USA
16.07.2012, 10am, SPMS-MAS-03-07

Aug

Cryptanalysis for Beginners
Dr Ivica NIKOLIC, Nanyang Technological University, Singapore
17.08.2012, 3.30pm, SPMS-MAS-05-36
Attached: Slides

Construction of Almost Optimal Resilient Boolean Functions
Prof XIAO Guozhen, Xidian University, China
24.08.2012, 3.30pm, SPMS-MAS-05-36

Sep

Codes on Graphs and the Pseudocodewords
Dr Wittawat KOSITWATTANARERK, Nanyang Technological University, Singapore
07.09.2012, 3.30pm, SPMS-MAS-05-36
Attached: Slides

On the Distribution of Atkin and Elkies Primes
Prof Igor SHPARLINSKI, Macquarie University, Australia
10.09.2012, 2pm, SPMS-MAS-05-36

Nov

The Black Dragon
Dr Matt HENRICKSEN, I2R, A*STAR
02.11.2012, 3.30pm, SPMS-MAS-05-36

Constructions of Frameproof codes
Dr ZHANG Xiande, Nanyang Technological University, Singapore
16.11.2012, 2pm, SPMS-MAS-05-36
Attached: Slides

SHA-3 Competition
Dr WANG Lei, Nanyang Technological University, Singapore
23.11.2012, 2pm, SPMS-MAS-05-36

Information Security Research at Royal Holloway
Prof Keith MARTIN, Royal Holloway, University of London, England
29.11.2012, 4.30pm, SPMS-MAS-05-36

A Coding-Theoretic Approach to Recovering Noisy RSA Keys
Prof Kenny PATERSON, Royal Holloway, University of London, England
29.11.2012, 5pm, SPMS-MAS-05-36
Attached: Slides

Dec

Enhancing Location Privacy for Electric Vehicles
Dr Joseph LIU, I2R, A*STAR
20.12.2012, 2pm, SPMS-MAS-05-36