NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage
Search CSRC:

crypto Reading club

NIST Computer Security Division is hosting Crypto Reading Club talks, to foster research and collaboration. Talks are held biweekly on Wednesday in Room B341, Building 222, from 10:00 AM to 12:00 PM, unless noted otherwise.

Reminders will be sent to subscribers of the Crypto Reading Club List. If you want to be included to the Crypto Reading Club List and/or give a talk, please contact Morris J. Dworkin or Meltem Sonmez Turan.

Upcoming Talks

  • August 6, 2014; Meltem Sonmez Turan, Ray Perlner, Allen Roginsky, Apostol Vassilev; Crypto Small Talks II

Sample Previous Talks

2014

Date: Speaker: Title:
July 28, 2014 Magnus Gausdal Find The Relationship Between Multiplicative Complexity and Nonlinearity
July 23, 2014 Yi-Kai Liu, Kerry McKay, Dustin Moody, John Kelsey Crypto Small Talks I
June 25, 2014 Morrie Dworkin The Riddle of the Labyrinth
June 11, 2014 Meltem Sonmez Turan Honeywords: Making Password-Cracking Detectable
May 28, 2014 Ray Perlner Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
May 14, 2014 Dustin Moody Elliptic Curves: Efficiency, Security, and Standards
April 30, 2014 Vadim Lyubashevsky Lattice Based Cryptography
April 16, 2014 Kerry McKay I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis
April 2, 2014 Dr. Jintai Ding Post-Quantum Cryptography - Multivariate Public Key Cryptography
March 19, 2014 Dr. Tromer, Josh Kanner and Dr. Sasson Moving to a New Paradigm of Trust in Continuous Monitoring of Cloud Computing
March 5, 2014 Rene Peralta NIST Randomness Beacon
Feb 19, 2014 John Kelsey Tor Users Get Routed

2013

Date: Speaker: Title:
Nov 13, 2013 Morrie Dworkin How to Share a Secret
Oct 30, 2013 Kerry A. McKay Introduction and Analysis of Geometric and Polygram Substitution Ciphers
Sept 18, 2013 Santanu Sarkar Cryptanalysis of RSA Variants and Implicit Factorization
Sept 4, 2013 Kyle J. Bunch The Use of Homomorphic Encryption Combined with Configurable Computing for Implementing Information Barriers in a Future Inspection Regime
Aug 7, 2013 Cagdas Calik Nonlinearity Computation for Sparse Boolean Functions
July 24, 2013 Sean Weaver Cryptol
July 10, 2013 John Kelsey Discussion on Bitcoin
June 12, 2013 Kerry McKay Discussion on TLS
May 22, 2013 David McGrew Hash-based Signatures
May 15, 2013 Dustin Moody Fully Homomorphic Encryption
April 17, 2103 Kerry McKay Decrypting Classical Cipher Text Using Markov Chain Monte Carlo
March 20, 2013 Morris J. Dworkin and Meltem Sonmez Turan Tutorial on Differential Cryptanalysis
March 6, 2103 Kerem Varici Differential Analysis of the LED Block Cipher
Jan. 13, 2013 Ray Perlner A Chosen-Ciphertext Attack on the Cipher Block Chaining (CBC) Mode
Jan. 9, 2103 Rene Peralta Four Measures of Nonlinearity

2012

Date: Speaker: Title:
Dec. 12, 2012 Stefan Lucks, Meltem Sonmez Turan and Morrie Dworkin Authenticated Encryption
Nov. 28, 2012 Santanu Sarkar Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
Nov. 7, 2012 Stefan Lucks Key Stretching, Memory Consumption, and the Pebbling Game
Oct. 31, 2012 Oscar Garcia-Morchon Towards Fully Collusion-Resistant ID-based Establishment of Pairwise Keys
Oct. 17, 2012 Ketan Mehta OPACITY and PLAID Authentication Protocols
Oct. 3, 2012 Stephen Jordan Classical and Quantum Circuit Obfuscation with Braids
Sept. 19, 2012 Meltem Sonmez Turan Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems Crypto 2012 Best Paper by I. Dinur, O. Dunkelman, N. Keller, A. Shamir
Aug. 9, 2012 Morrie Dworkin Any Finite Subgroup of the Multiplicative Group of a Field is Cyclic
July 25, 2012 Arnab Roy Big data - WEBINAR
July 11, 2012 Peter Mell Overview on Big Data and its Security Implications
June 27, 2012 Luís Brandão 1-output 2-party Secure Function Evaluation with Malicious Parties
May 30, 2012 Daniel Smith-Tone Differential Properties of MPKCs with Multiple Variable Types
May 16, 2012 Arnab Roy Relatively-Sound NIZKs and Password-Based Key-Exchange
May 9, 2012 Lars Jonas Andersson System on Card
April 18, 2012 Quynh Dang Randomized Hashing
March 7, 2012 Ray Perlner On Error Correcting Code and Cryptographic Schemes Based on Coding Theory
Feb. 21, 2012 Dr. Anna Lysyanskaya Authentication without Identification
Feb. 8, 2012 Lily Chen Security in Mobility
Jan. 25, 2012 John Kelsey Order Preserving Encryption (OPE)
Jan. 8, 2012 Ismet Sahin Random Lines Global Optimization Algorithm

2011

Date: Speaker: Title:
Sept. 22, 2011 Wayne Patterson The Cryptology of Baseball
Sept. 14, 2011 Filip Zagorski An Absentee Voting System
Aug. 3, 2011 Yi-Kai Liu Quantum Algorithms for Algebraic Problems
July 13, 2011 Errol Markland Jr. Implementing Cryptographic Algorithms
June 29, 2011 John Kelsey Side Channel Attacks
May 18, 2011 Cathy Tilton Using Biometrics for Authentications
May 11, 2011 Poorvi Vora Paperless Independently-Verifiable Voting
April 27, 2011 Tyler Shields Dirty Little Secrets: Mobile Apps Invading Your Privacy - WEBINAR
April 20, 2011 Rick Kuhn and Raghu Kacker Combinatorial Testing
April 6, 2011 Meltem Sonmez Turan Distance Bounding Protocols
Feb. 23, 2011 Sheila Frankel Security in IPv6
Feb. 9, 2011 Serge Egelman It's All About The Benjamins: An empirical study on incentivizing users to ignore security advice
Jan. 26, 2011 Rene Peralta Selective-Disclosure Envelopes: Construction and Applications

2010

Date: Speaker: Title:
Dec. 15, 2010 Souradyuti Paul Mode of Operations of SHA-2 candidates
Dec. 1, 2010 John Kelsey “Understanding scam victims: seven principles for systems security” and “The psychology of scams: Provoking and committing errors of judgment” papers
Nov. 3, 2010 Lily Chen Tunneled Authentication
Oct. 6, 2010 Meltem Sonmez Turan Cryptographic Key Derivation from Passwords
Sept. 22, 2010 Dustin Moody Verheul’s Theorem and the Security of Pairing-based Cryptography
July 28, 2010 Mridul Nandi Security Notions and Some Popular Examples of Multi party Protocols
July 7, 2010 Allen Roginsky Distribution of Prime Numbers
June 16, 2010 Elaine Barker Transition of Cryptographic Algorithms and Key Length
May 5, 2010 Francesca Slade Classification of Peer Production: The Identification of Malfeasance on Collaborative Online Systems
April 21, 2010 John Kelsey Fuzzy Extractors
April 7, 2010 Kerry McKay Pseudo-linear Statistical Distinguishers for Block Ciphers
March 24, 2010 Annabelle Lee Smart Grid and Related Security Issues
March 10, 2010 Lily Chen Authenticated Key Establishment in Practice
Feb. 24, 2010 Bill MacGregor Chip and Pin Attack
Jan. 27, 2010 Mridul Nandi Zero Knowledge Proofs

2009

Date: Speaker: Title:
Dec. 2, 2009 Allen Roginsky Authenticated Key Establishment
Nov. 4, 2009 Mridul Nandi Primes is in P
Oct. 21, 2009 Allen Roginsky Introduction to Bloom Filters
Oct. 7, 2009 Meltem Sonmez Turan Introduction to Feedback Shift Registers
Sept. 9, 2009 Souradyuti Paul AES Related-Key Attacks
Aug. 11, 2009 Allen Roginsky Discrete Logarithm Problem (DLP) and Reduction of DLP over an Elliptic Curve
July 29, 2009 Mridul Nandi Security Preserved Padding Methods on MD Hash
July 8, 2009 Radia Perlman Privacy-Preserving DRM
June 17, 2009 Mridul Nandi Survey on Twenty years of Attack on RSA
June 3, 2009 John Kelsey Preimage Attacks on JH
May 6, 2009 Souradyuti Paul Cryptanalysis of Shavite and EnRupt
April 22, 2009 Souradyuti Paul Cryptanalysis on MD6 and CubeHash
April 8, 2009 Ray Perlner Quantum Resistant Public Key Cryptography
March 25, 2009 Lily Chen Trusted Platform Technologies
March 11, 2009 Rene Peralta Circuits in Crypto Applications
Jan. 28, 2009 Mridul Nandi Fast and Secure CBC Type MAC Algorithms
Jan. 24, 2009 Souradyuti Paul Hash Cryptanalysis

2008

Date: Speaker: Title:
Dec. 17, 2008 Peter Mell Cloud Computing Horizons
Dec. 3, 2008 Lee Badger Virtualization Models and Security
Nov. 12, 2008 Souradyuti Paul Hash Functions
Oct. 8, 2008 Andrew Regenscheid General Overview of Cryptographic Voting Schemes
Sept. 24, 2008 Mridul Nandi MAC based on Compression Functions
Aug. 27, 2008 Allen Roginsky Signcryption
July 16, 2008 Mridul Nandi Collision-Resistant Hashing: Towards Making
March 26, 2008 John Kelsey On Hash Functions
Feb. 27, 2008 Jose A. Montenegro Secure Sealed-Bid Online Auctions Using Discreet Cryptographic Proofs
Feb. 13, 2008 Morrie Dworkin GCM Mode
Jan. 16, 2008 John Kelsey Hash functions

2007

Date: Speaker: Title:
August 8, 2007 John Kelsey Discussions on MD4
June 20, 2007 John Kelsey Parallel Collision Search
June 6, 2007 Allen Roginsky RSA Digital Signature and its Security
April 23, 2007 Katrin Hoeper Security Analysis of EAP Methods

2006

Date: Speaker: Title:
May 09, 2006 Rene Peralta Weil Pairing