Jan
Erasure Codes for Heterogeneous Networked Storage Systems
Dr Lluis PAMIES-JUAREZ, Nanyang Technological University, Singapore
25.01.2012, 11am, SPMS-MAS-05-36
Attached: Slides
Feb
Hashing into Elliptic Curves
Dr Reza Rezaeian FARASHAHI, Macquarie University, Australia
01.02.2012, 11am, SPMS-MAS-05-36
Multi-Exponentiation Algorithms
Dr CHEN Chien-Ning, Nanyang Technological University, Singapore
15.02.2012, 11am, SPMS-MAS-05-36
Attached: Slides
How to build a secure communication channel
Dr YANG Guomin, Temasek Laboratories, NUS, Singapore
22.02.2012, 11am, SPMS-MAS-05-36
Attached: Slides
Mar
Construction of bent functions based on Z-bent functions
Prof Sugata GANGOPADHYAY, Indian Statistical Institute, Chennai Centre, India
21.03.2012, 11am, SPMS-MAS-05-36
Attached: Slides
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis
Dr LU Jiqiang, I2R, A*STAR, Singapore
28.03.2012, 11am, SPMS-MAS-05-36
Attached: Slides
Apr
Stark Units and the Point Counting Problem
Prof HUANG Ming-Deh, University of Southern California, California, USA
04.04.2012, 11am, SPMS-MAS-05-36
Extending Brickell-Davenport Theorem to non-Perfect Secret Sharing Schemes
Dr Oriol FARRAS, Universitat Rovira i Virgili, Spain
18.04.2012, 11am, SPMS-MAS-05-36
Attached: Slides
Live mobile device forensics
Dr Vrizlynn THING, I2R, A*STAR, Singapore
25.04.2012, 11am, SPMS-MAS-05-36
May
Shorter IBE and Signatures via Asymmetric Pairings
CHEN Jie, Nanyang Technological University, Singapore
02.05.2012, 11am, SPMS-MAS-05-36
Jun
Side-Channel Attacks: An Overview of Suitable Methods
Annelie HEUSER, Technische Universität Darmstadt, Germany
04.06.2012, 2pm, SPMS-MAS-05-36
Constructive Side-Channel Analysis: A Useful Tool for Secure Circuit Design
Marc STOTTINGER, Technische Universität Darmstadt, Germany
04.06.2012, 2.30pm, SPMS-MAS-05-36
Attached: Slides
Identity-Based Encryption Resilient to Continual Auxiliary Leakage
Dr Sherman CHOW, University of Waterloo, Canada
26.06.2012, 11am, SPMS-MAS-05-36
Group Signature Scheme and Biometric Identity Management
Dr Hervé CHABANNE, Morpho
29.06.2012, 2pm, SPMS-MAS-05-36
Jul
Polar Codes: From Theory To Practice
Prof Alexander VARDY, University of California, USA
16.07.2012, 10am, SPMS-MAS-03-07
Aug
Cryptanalysis for Beginners
Dr Ivica NIKOLIC, Nanyang Technological University, Singapore
17.08.2012, 3.30pm, SPMS-MAS-05-36
Attached: Slides
Construction of Almost Optimal Resilient Boolean Functions
Prof XIAO Guozhen, Xidian University, China
24.08.2012, 3.30pm, SPMS-MAS-05-36
Sep
Codes on Graphs and the Pseudocodewords
Dr Wittawat KOSITWATTANARERK, Nanyang Technological University, Singapore
07.09.2012, 3.30pm, SPMS-MAS-05-36
Attached: Slides
On the Distribution of Atkin and Elkies Primes
Prof Igor SHPARLINSKI, Macquarie University, Australia
10.09.2012, 2pm, SPMS-MAS-05-36
Nov
The Black Dragon
Dr Matt HENRICKSEN, I2R, A*STAR
02.11.2012, 3.30pm, SPMS-MAS-05-36
Constructions of Frameproof codes
Dr ZHANG Xiande, Nanyang Technological University, Singapore
16.11.2012, 2pm, SPMS-MAS-05-36
Attached: Slides
SHA-3 Competition
Dr WANG Lei, Nanyang Technological University, Singapore
23.11.2012, 2pm, SPMS-MAS-05-36
Information Security Research at Royal Holloway
Prof Keith MARTIN, Royal Holloway, University of London, England
29.11.2012, 4.30pm, SPMS-MAS-05-36
A Coding-Theoretic Approach to Recovering Noisy RSA Keys
Prof Kenny PATERSON, Royal Holloway, University of London, England
29.11.2012, 5pm, SPMS-MAS-05-36
Attached: Slides
Dec
Enhancing Location Privacy for Electric Vehicles
Dr Joseph LIU, I2R, A*STAR
20.12.2012, 2pm, SPMS-MAS-05-36