| Dec. 12, 2012 |
Stefan Lucks, Meltem Sonmez Turan and Morrie Dworkin |
Authenticated Encryption |
| Nov. 28, 2012 |
Santanu Sarkar |
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents |
| Nov. 7, 2012 |
Stefan Lucks |
Key Stretching, Memory Consumption, and the Pebbling Game |
| Oct. 31, 2012 |
Oscar Garcia-Morchon |
Towards Fully Collusion-Resistant ID-based Establishment of Pairwise Keys |
| Oct. 17, 2012 |
Ketan Mehta |
OPACITY and PLAID Authentication Protocols |
| Oct. 3, 2012 |
Stephen Jordan |
Classical and Quantum Circuit Obfuscation with Braids |
| Sept. 19, 2012 |
Meltem Sonmez Turan |
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems Crypto 2012 Best Paper by I. Dinur, O. Dunkelman, N. Keller, A. Shamir |
| Aug. 9, 2012 |
Morrie Dworkin |
Any Finite Subgroup of the Multiplicative Group of a Field is Cyclic |
| July 25, 2012 |
Arnab Roy |
Big data - WEBINAR |
| July 11, 2012 |
Peter Mell |
Overview on Big Data and its Security Implications |
| June 27, 2012 |
Luís Brandão |
1-output 2-party Secure Function Evaluation with Malicious Parties |
| May 30, 2012 |
Daniel Smith-Tone |
Differential Properties of MPKCs with Multiple Variable Types |
| May 16, 2012 |
Arnab Roy |
Relatively-Sound NIZKs and Password-Based Key-Exchange |
| May 9, 2012 |
Lars Jonas Andersson |
System on Card |
| April 18, 2012 |
Quynh Dang |
Randomized Hashing |
| March 7, 2012 |
Ray Perlner |
On Error Correcting Code and Cryptographic Schemes Based on Coding Theory |
| Feb. 21, 2012 |
Dr. Anna Lysyanskaya |
Authentication without Identification |
| Feb. 8, 2012 |
Lily Chen |
Security in Mobility |
| Jan. 25, 2012 |
John Kelsey |
Order Preserving Encryption (OPE) |
| Jan. 8, 2012 |
Ismet Sahin |
Random Lines Global Optimization Algorithm |
| Sept. 22, 2011 |
Wayne Patterson |
The Cryptology of Baseball |
| Sept. 14, 2011 |
Filip Zagorski |
An Absentee Voting System |
| Aug. 3, 2011 |
Yi-Kai Liu |
Quantum Algorithms for Algebraic Problems |
| July 13, 2011 |
Errol Markland Jr. |
Implementing Cryptographic Algorithms |
| June 29, 2011 |
John Kelsey |
Side Channel Attacks |
| May 18, 2011 |
Cathy Tilton |
Using Biometrics for Authentications |
| May 11, 2011 |
Poorvi Vora |
Paperless Independently-Verifiable Voting |
| April 27, 2011 |
Tyler Shields |
Dirty Little Secrets: Mobile Apps Invading Your Privacy - WEBINAR |
| April 20, 2011 |
Rick Kuhn and Raghu Kacker |
Combinatorial Testing |
| April 6, 2011 |
Meltem Sonmez Turan |
Distance Bounding Protocols |
| Feb. 23, 2011 |
Sheila Frankel |
Security in IPv6 |
| Feb. 9, 2011 |
Serge Egelman |
It's All About The Benjamins: An empirical study on incentivizing users to ignore security advice |
| Jan. 26, 2011 |
Rene Peralta |
Selective-Disclosure Envelopes: Construction and Applications |
| Dec. 15, 2010 |
Souradyuti Paul |
Mode of Operations of SHA-2 candidates |
| Dec. 1, 2010 |
John Kelsey |
“Understanding scam victims: seven principles for systems security” and “The psychology of scams: Provoking and committing errors of judgment” papers |
| Nov. 3, 2010 |
Lily Chen |
Tunneled Authentication |
| Oct. 6, 2010 |
Meltem Sonmez Turan |
Cryptographic Key Derivation from Passwords |
| Sept. 22, 2010 |
Dustin Moody |
Verheul’s Theorem and the Security of Pairing-based Cryptography |
| July 28, 2010 |
Mridul Nandi |
Security Notions and Some Popular Examples of Multi party Protocols |
| July 7, 2010 |
Allen Roginsky |
Distribution of Prime Numbers |
| June 16, 2010 |
Elaine Barker |
Transition of Cryptographic Algorithms and Key Length |
| May 5, 2010 |
Francesca Slade |
Classification of Peer Production: The Identification of Malfeasance on Collaborative Online Systems |
| April 21, 2010 |
John Kelsey |
Fuzzy Extractors |
| April 7, 2010 |
Kerry McKay |
Pseudo-linear Statistical Distinguishers for Block Ciphers |
| March 24, 2010 |
Annabelle Lee |
Smart Grid and Related Security Issues |
| March 10, 2010 |
Lily Chen |
Authenticated Key Establishment in Practice |
| Feb. 24, 2010 |
Bill MacGregor |
Chip and Pin Attack |
| Jan. 27, 2010 |
Mridul Nandi |
Zero Knowledge Proofs |
| Dec. 2, 2009 |
Allen Roginsky |
Authenticated Key Establishment |
| Nov. 4, 2009 |
Mridul Nandi |
Primes is in P |
| Oct. 21, 2009 |
Allen Roginsky |
Introduction to Bloom Filters |
| Oct. 7, 2009 |
Meltem Sonmez Turan |
Introduction to Feedback Shift Registers |
| Sept. 9, 2009 |
Souradyuti Paul |
AES Related-Key Attacks |
| Aug. 11, 2009 |
Allen Roginsky |
Discrete Logarithm Problem (DLP) and Reduction of DLP over an Elliptic Curve |
| July 29, 2009 |
Mridul Nandi |
Security Preserved Padding Methods on MD Hash |
| July 8, 2009 |
Radia Perlman |
Privacy-Preserving DRM |
| June 17, 2009 |
Mridul Nandi |
Survey on Twenty years of Attack on RSA |
| June 3, 2009 |
John Kelsey |
Preimage Attacks on JH |
| May 6, 2009 |
Souradyuti Paul |
Cryptanalysis of Shavite and EnRupt |
| April 22, 2009 |
Souradyuti Paul |
Cryptanalysis on MD6 and CubeHash |
| April 8, 2009 |
Ray Perlner |
Quantum Resistant Public Key Cryptography |
| March 25, 2009 |
Lily Chen |
Trusted Platform Technologies |
| March 11, 2009 |
Rene Peralta |
Circuits in Crypto Applications |
| Jan. 28, 2009 |
Mridul Nandi |
Fast and Secure CBC Type MAC Algorithms |
| Jan. 24, 2009 |
Souradyuti Paul |
Hash Cryptanalysis |