The Crypto Reading Group holds regular discussions on various topics in cryptography and computer security. Everyone (regardless of background) is welcome to attend.
To be added to the mailing list for the crypto reading group, go here
During Fall, 2004 we will meet on Mondays from
2-3:30 pm in 3118 CSIC unless noted otherwise.
We will meet on alternate weeks, and the quantum reading group will meet the other weeks at the same time.
Date | Time | Topic | Presented by | References |
---|---|---|---|---|
11/15/04 | 2:00 | On the (Im)possibility of Cryptography with Imperfect Randomness | Adam Bender | The paper by Dodis, et al. is available here |
11/1/04 | 2:00 | Reusable cryptographic fuzzy extractors | Nan Wang | The paper by X. Boyen is available here |
10/18/04 | 2:00 | Constructions of digital fingeprinting codes | Prof. Alex Barg | The paper by A. Barg, G.R. Blakley, and G. Kabatiansky: "Digital fingerprinting codes: Problem statements, construction, idenfitication of traitors" is available here |
10/4/04 | 2:00 | Can real-world hash functions be modeled as random oracles? | Jonathan Katz | (none yet) |
9/20/04 | 2:00 | Identity-Based Encryption | Ruggero Morselli | Ruggero will present the recent paper by Waters |
7/29/04 | 2:00 | Provable Security for Routing Protocols | Alvaro Cardenas | Alvaro will present the paper "Towards Provable Security for Ad Hoc Routing Protocols", by Buttyan and Vajda |
7/22/04 | 2:00 | Formal Methods vs. Cryptographic Security | Ji Sun Shin | Ji Sun will present the paper "Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)", by Abadi and Rogaway |
7/15/04 | 2:00 In 3165 AV Williams |
Cryptography from Biometrics | Alvaro Cardenas | The paper by Dodis, et al. is available at the eprint archives |
7/8/04 | 2:00 In 3165 AV Williams |
"Secret Handshakes" | Gelareh Taban | The papers by Balfanz, et al. and Castelluccia, et al. will be presented |
7/1/04 | 2:00 | Universally Composable Notions of Key Exchange | Ji Sun Shin | The paper by Canetti and Krawczyk is available here |
6/24/04 | 2:00 | Encryption in the Bounded Storage Model | Nan Wang | The paper by Dziembowski and Maurer appeared in the Journal of Cryptology, 2004 |
6/17/04 | 2:00 | Obfuscation | Omer Horvitz | We will discuss the following papers:
|
6/10/04 | 2:00 | Entity Authentication and Key Distribution | Ruggero Morselli | The paper by Bellare and Rogaway is available here |
6/4/04 | 2:00 | A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols | Chiu-Yuen Koo | The paper by Bellare, Canetti, and Krawczyk is available here |
12/9/03 | 1:00 | Secure Multi-Party Computation | Jonathan Katz | Goldreich's notes; see below |
12/2/03 | 1:00 In 4185 AV Williams |
Private Information Retrieval (PIR) | Prof. Bill Gasarch | Prof. Gasarch maintains a web page with more information about PIR |
11/11/03 | 1:15 | Verifiable Secret Sharing (VSS) with Dishonest Minority | Chiu-Yuen Koo | Chiu will present the paper by Ben-Or and Rabin about VSS (with a broadcast channel) tolerating any dishonest minority |
11/4/03 | 1:00 | Secure Two-Party Computation in Constant Rounds | Jonathan Katz | We will cover Yao's "garbled circuit" technique, as well as the paper on constant-round coin tossing by Lindell |
10/30/03 Note different day and time! |
2:00 | Privacy Preserving Data Mining | Prof. Kevin Du, Syracuse University (invited lecturer) | See the abstract here |
10/21/03 | 1:00 In 4185 AV Williams! |
Concurrent Two-Party Computation: Definitions and Impossibility Results | Omer Horvitz | The talk is based on a paper by Lindell, available here |
10/7/03 | 1:45 | Secure Two-Party Computation for Malicious Adversaries II | Jonathan Katz | We will pick up where we left off on 10/7/03 |
10/14/03 | 1:00 | Efficiency Improvements for Signature Schemes with Tight Security Reductions | Nan Wang | The relevant paper, by Katz and Wang, will appear at ACM CCCS '03 and is available here |
10/7/03 | 1:00 | Secure Two-Party Computation for Malicious Adversaries | Jonathan Katz | The talk will be based on Goldreich's notes; see 9/23/03 |
9/30/03 | - | NO SEMINAR | - | - |
9/23/03 | 1:00 | Secure Two-Party Computation for Honest-but-Curious Adversaries | Jonathan Katz | The talk will be based on Oded Goldreich's notes (i.e., Chapter 7 of his upcoming book), available here |
9/15/03 Note special day |
1:00 | Impossibility Results for the Composition of Secure Two-Party Protocols | Yehuda Lindell, IBM (invited lecturer) | Yehuda's slides are available on-line. Some of the papers Yehuda talked about are available from his homepage |
8/14/03 | 2:00 - 3:30pm | Threshold Cryptography | Prabha Ramachandran | Ideal Threshold Schemes from MDS Codes, by Pieprzyk and Zhang (ISISC 2002) |
8/7/03 | 2:00 - 3:30pm | Perfectly-Secure Group Key Distribution | Aram Khalili | "Perfectly-Secure Key Distribution for Dynamic Conferences," by Blundo, et al. Available from CiteSeer |
7/31/03 | 2:00 - 3:30pm | Threshold Password-Based Authentication | Ji Sun Shin | "Provably-Secure Threshold Password-Authenticated Key Exchange," by Di Raimondo and Gennaro (appeared at Eurocrypt 2003): proceedings version | full version |
7/24/03 | 2:00 - 3:30pm | Broadcast | Chiu-Yuen Koo | From Partial Consistency to Global Broadcast, by Fitzi and Maurer |
7/17/03 | 2:00 - 3:30pm | Group Signatures | Xun Yuan | Foundations of Group Signatures..., by Bellare, Micciancio, and Warinschi (appeared at Eurocrypt '03) |
7/10/03 | 2:00 - 3:30pm | Aggregate Signatures | Jonathan Katz | The relevant papers are:
|
6/26/03 | 2:00 - 3:30pm | Public-Key Encryption Based on Polynomial Reconstruction: A Proposed Scheme and Some Attacks | Austin Parker | The relevant papers are:
|
6/19/03 | 2:00 - 3:30pm | A Perfect Commitment Scheme Based on One-Way Permutations | Omer Horvitz | The paper by Naor, Ostrovsky, Venkatesan, and Yung is available here |
6/12/03 | 2:00 - 3:30pm | Signature Schemes Based on the Strong RSA Assumption (and no random oracles!) | Ruggero Moreslli | Representative papers include:
|
4/30/03 | 2:00 - 3:30pm | A Signature Scheme as Secure as the Diffie-Hellman Problem | Nan Wang | "A Signature Scheme as Secure as the Diffie-Hellman Problem," by E.-J. Goh and S. Jarecki (appeared at Eurocrypt '03) |
4/16/03 | 2:00 - 3:30pm | Identity-Based Encryption | Aram Khalili | "An Identity-Based Encryption Schemes Based on Quadratic Residues," by C. Cocks |
4/9/03 | 2:00 - 3:30pm | Security Flaws Induced by CBC Padding | Ruggero Morselli | "Security Flaws Induced by CBC Padding...," by S. Vaudenay |
3/26/03 | 2:00 - 3:00pm | Steganography | Jonathan Katz | "Provably Secure Steganography," by N. Hopper, J. Langford, and L. von Ahn |
3/12/03 | 2:00 - 3:00pm | Lower Bounds on the Efficiency of Generic Cryptographic Constructions | Omer Horvitz | "Lower Bounds on the Efficiency of Generic Cryptographic Constructions," by R. Gennaro and L. Trevisan |
3/5/03 | 2:00 - 3:00pm | Key Predistribution Schemes for Distributed Sensor Networks | Prof. Virgil Gligor | "A Key Management Scheme for Distributed Sensor Networks," by L. Eschenauer and V. Gligor |
2/27/03 | 2:00 - 3:00pm | Key Predistribution Schemes for Distributed Sensor Networks | Aram Khalili | "A Key Management Scheme for Distributed Sensor Networks," by L. Eschenauer and V. Gligor |
2/14/03 | 10:00 - 11:00am | Blockwise-Adaptive Security | Greg Bard | "Blockwise-Adaptive Attackers: Revisiting the (In)security of Some Provably Secure Encryption Modes," by A. Joux, G. Martinet, and F. Valette |
12/3/02 | 2:00 - 3:15pm | Network Cryptographic Devices Resilient to Capture | Gelareh Taban | "Networked Cryptographic Devices Resilient to Capture," by P. MacKenzie and M. Reiter (full version) |
11/26/02 | 2:00 - 3:30pm | Verifiable Secret Sharing | Aram Khalili |
|
11/19/02 | 2:00 - 3:15pm | Forward-Secure Signatures, continued | Radostina Koleva | See 11/12/02 |
11/12/02 | 2:00 - 3:15pm | Forward-Secure Signatures | Radostina Koleva | "A Forward-Secure Digital Signature Scheme," by M. Bellare and S. Miner |
11/5/02 | 2:00 - 3:15pm | Transitive Signatures | Jonathan Katz | "Transitive Signatures Based on Factoring and RSA," by M. Bellare and G. Neven
"Transitive Signature Schemes," by S. Micali and R. Rivest |
10/29/02 | 9:45 - 11:00am | Security of SSH | Greg Bard | "Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol," by M. Bellare, T. Kohno, and C. Namprempre |
10/22/02 | 9:45 - 11:00am | Introduction to elliptic curves, part 2 | Justin Brody |
|
10/15/02 | 2:00 - 3:00pm | Introduction to elliptic curves, part 1 | Justin Brody | See 10/22/02 |
10/8/02 | 10:00 - 11:00am | ID-based Encryption from the Weil Pairing, part 2 | Aram Khalili | See 10/1/02 |
10/1/02 | 10:00 - 11:00am | ID-based Encryption from the Weil Pairing, part 1 | Aram Khalili |
"Identity Based Encryption from the Weil Pairing," by D. Boneh and M. Franklin
Aram's notes |
9/24/02 | 10:00 - 11:00am | Short Signatures from the Weil Pairing | Aram Khalili |
"Short Signatures from the Weil Pairing," by D. Boneh, B. Lynn, and H. Shacham
Aram's notes |