IASTU Cryptology Seminars

Date
  Speaker  
Affiliation
Title (click for abstract)
Note
Oct 21, 2016Willi MeierUniversity of Applied Sciences and Arts Northwestern SwitzerlandStream ciphers: old and new directions

poster.pdf

July 28, 2015Ming-Deh HuangUniversity of Southern CaliforniaWeil descent, last fall degree and the elliptic curve discrete logarithm problem 
June 5, 2015Zhenfu CaoEast China Normal University密码安全的新方向 
July 16, 2014Guangwu XuUniversity of Wisconsin-MilwaukeeWindow τ-NAF for Koblitz Curves with Optimal Pre-Computation (II) 
June 6, 2014Xiaoming SunInstitute of Computing Technology, CASDeterministic Protocol for Shared Q-queue J-choice K-best Secretary Problem 
Jan 9, 2014Guangwu XuUniversity of Wisconsin-MilwaukeeWindow τ-NAF for Koblitz Curves with Optimal Pre-Computation 
Sept.2, 2013Marc StevensCentrum Wiskunde & Informatica, NetherlandsImproving Counter-cryptanalysis 
Sept.2, 2013Gaëtan LeurentUniversité Catholique de Louvain, BelgiqueNew Generic attacks on Hash-based MACs 
July 2, 2013Guangwu XuUniversity of Wisconsin-MilwaukeeAn Exponential Sum for Coset: Refinements and Applications 
June 13, 2013MING-DEH HUANGUNIVERSITY OF SOUTHERN CALIFORNIA RECENT DEVELOPMENTS ON TWO PROBLEMS CONCERNING MULTIPLICATIVE GROUPS OF FINITE FIELDS  
May 20, 2013Phong Q. NguyenINRIA / IASTUStructural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions 
 Sept 19,2012
Heng FanInstitute of Physics, CASSome developments in quantum key distributions 
Nov 28, 2012Jian GuoInstitute for Infocomm Research (I2R), SingaporeKey Recovery Attack on HMAC/NMAC based on Reduced Whirlpool